Login / Signup
Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications.
James W. Gray III
Kin Fai Epsilon Ip
King-Shan Lui
Published in:
CSFW (1997)
Keyphrases
</>
cryptographic protocols
security protocols
authentication protocol
database
web services
data analysis
intrusion detection
information security