First Page | Document Content | |
---|---|---|
![]() Date: 2013-04-29 11:09:46Burrows–Abadi–Needham logic Needham–Schroeder protocol Public-key cryptography Cryptographic nonce XTR Deniable authentication Security protocol notation Wide Mouth Frog protocol Cryptographic protocols Cryptography Data | Add to Reading List |