![Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information](https://www.pdfsearch.io/img/a26c4c16c61111006f41903ebaa424e6.jpg)
| Document Date: 2003-12-17 02:53:50 Open Document File Size: 27,60 KBShare Result on Facebook
Company Needham / / IndustryTerm actual protocol / infinite state systems / authentication protocol / e - business / cryptographic protocols / e-vote / e-society / / Person Horn Clauses / / Technology html / authentication protocol / cryptography / one-memory protocols / actual protocol / / URL www.cmi.univ-mrs.fr / /
SocialTag |