Login / Signup

Formal verification of secure information flow in cloud computing.

Wen ZengMaciej KoutnyPaul WatsonVasileios Germanos
Published in: J. Inf. Secur. Appl. (2016)
Keyphrases