![Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR](https://www.pdfsearch.io/img/3beb8f2d687a6f4e6f86de6659680ab4.jpg) Date: 2007-10-18 09:44:59Cryptography Public-key cryptography E-commerce Cryptographic protocols Internet Standards Computer security DolevYao model Cryptographic primitive Digital signature Communications protocol BurrowsAbadiNeedham logic XTR | | Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, EcoleAdd to Reading ListSource URL: www-verimag.imag.frDownload Document from Source Website File Size: 284,93 KBShare Document on Facebook
|