Login / Signup
To infinity and beyond or, avoiding the infinite in security protocol analysis.
James Heather
Steve A. Schneider
Published in:
SAC (2006)
Keyphrases
</>
security protocols
lightweight
data analysis
low cost
end to end