Author: Hui M.L.
Publisher: Ios Press
ISSN: 0926-227X
Source: Journal of Computer Security, Vol.9, Iss.1-2, 2001-01, pp. : 3-46
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Safely composing security protocols
By Cortier Véronique Delaune Stéphanie
Formal Methods in System Design, Vol. 34, Iss. 1, 2009-02 ,pp. :