No. Title Author Year
1 Transforming Password Protocols to Compose Chevalier, Céline et al. 2011
2 Simulation based security in the applied pi calculus Delaune, Stéphanie et al. 2009
Current Page :
Number of result pages: 1
Number of documents: 2


DROPS-Home | Fulltext Search | Imprint Published by LZI