Author: Holdener Judy Holdener Eric
Publisher: Taylor & Francis Ltd
ISSN: 0161-1194
Source: Cryptologia, Vol.31, Iss.4, 2007-10, pp. : 316-323
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Security pitfalls in cryptographic design
Information Management & Computer Security, Vol. 6, Iss. 3, 1998-03 ,pp. :
Abstracting cryptographic protocols with tree automata
By Monniaux D.
Science of Computer Programming, Vol. 47, Iss. 2, 2003-05 ,pp. :
On the Symbolic Reduction of Processes with Cryptographic Functions
By Amadio R.
Electronic Notes in Theoretical Computer Science, Vol. 55, Iss. 1, 2004-01 ,pp. :
Cryptographic Methods During the Mexican Revolution
By Angel Angel Jose de Morales-Luna Guillermo
Cryptologia, Vol. 33, Iss. 2, 2009-04 ,pp. :