Login / Signup
Prudent engineering practice for cryptographic protocols.
Martín Abadi
Roger M. Needham
Published in:
IEEE Symposium on Security and Privacy (1994)
Keyphrases
</>
cryptographic protocols
standard model
security properties
engineering design
low cost
security protocols
query processing
data sources
sensor networks
software engineering
private information retrieval