Back to Results
First PageMeta Content
Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography


Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2
Add to Reading List

Document Date: 2010-07-17 01:14:15


Open Document

File Size: 196,73 KB

Share Result on Facebook