Using Trace Formulae for Security Protocol Design

Share/Save/Bookmark

Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. [Report]

[img]PDF
Restricted to UT campus only

206Kb
Item Type:Report
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/63064
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page