Back to Results
First PageMeta Content



Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de
Add to Reading List

Document Date: 2014-06-16 14:53:59


Open Document

File Size: 335,19 KB

Share Result on Facebook