Sign in

Model based security verification of protocol implementation.

Yulong FuOusmane Koné
Published in: J. Inf. Secur. Appl. (2015)
Keyphrases