Date: 2007-10-18 09:44:59Cryptography Public-key cryptography E-commerce Cryptographic protocols Internet Standards Computer security DolevYao model Cryptographic primitive Digital signature Communications protocol BurrowsAbadiNeedham logic XTR | | Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, EcoleAdd to Reading ListSource URL: www-verimag.imag.frDownload Document from Source Website File Size: 284,93 KBShare Document on Facebook
|