Login / Signup
On Different Approaches to Establish the Security of Cryptographic Protocols.
Tom Coffey
Reiner Dojen
Tomas Flanagan
Published in:
Security and Management (2003)
Keyphrases
</>
cryptographic protocols
security properties
encryption decryption
network security
intrusion detection
database
real time
high dimensional
distributed systems
security requirements
insider attacks
locally decodable codes