Login / Signup
Application of Dependency Graphs to Security Protocol Analysis.
Ilja Tsahhirov
Peeter Laud
Published in:
TGC (2007)
Keyphrases
</>
dependency graphs
security protocols
databases
data structure
distributed systems