Using Trace Formulae for Security Protocol Design

Share/Save/Bookmark

Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. [Report]

[img] PDF
Restricted to UT campus only

211kB
Item Type:Report
Additional information:Imported from CTIT
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/63064
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page