Login / Signup

Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications.

James W. Gray IIIKin Fai Epsilon IpKing-Shan Lui
Published in: CSFW (1997)
Keyphrases
  • cryptographic protocols
  • security protocols
  • authentication protocol
  • database
  • web services
  • data analysis
  • intrusion detection
  • information security