Login / Signup

Proved generation of implementations from computationally secure protocol specifications.

David CadéBruno Blanchet
Published in: J. Comput. Secur. (2015)
Keyphrases