Back to Results
First PageMeta Content
Applied mathematics / Distance-bounding protocol / IP / NEXPTIME / Formal verification / Alice and Bob / Public-key cryptography / Man-in-the-middle attack / Interactive proof system / Cryptography / Cryptographic protocols / Theoretical computer science


Document Date: 2012-08-29 07:20:33


Open Document

File Size: 637,74 KB

Share Result on Facebook
UPDATE