Cryptographic protocol : Security Analysis Based on Trusted Freshness /
Format: | Book |
---|---|
Published: |
c2012.
|
Online Access: | Ver documento en línea |
Similar Items
-
Applied cryptology, cryptographic protocols, and computer security models
Published: (1983) -
Cryptographic engineering /
Published: (2009) -
Cryptographic Engineering /
Published: (2009) -
Construction and analysis of cryptographic functions /
Published: (2014) -
Cryptographic obfuscation : A Survey /
Published: (2020)