Login / Signup
A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols.
Wenbo Mao
Published in:
Comput. Stand. Interfaces (2005)
Keyphrases
</>
cryptographic protocols
mobile robot
distributed environment
database
software engineering
security protocols
service description