![Computer security software Computer security software](https://www.pdfsearch.io/img/001c33f8b77969e101822a2a0e9c5bd6.jpg) Date: 2013-02-08 11:39:45Computer security software | | Strategic Analysis of Trust Models for User-Centric Networks Marta Kwiatkowska David Parker Aistis SimaitisAdd to Reading ListSource URL: www.prismmodelchecker.orgDownload Document from Source Website File Size: 214,49 KBShare Document on Facebook
|