Login / Signup

Application of Dependency Graphs to Security Protocol Analysis.

Ilja TsahhirovPeeter Laud
Published in: TGC (2007)
Keyphrases
  • dependency graphs
  • security protocols
  • databases
  • data structure
  • distributed systems