|
ComputingReviews.com
|
Verification methods for the computationally complete symbolic attacker based on indistinguishability Bana G., Chadha R., Eeralla A., Okada M. ACM Transactions on Computational Logic21(1):1-44,2019.Type:Article |
|
|
|
Published By: ACM Press |
|
|
|
|
|
|
|
|
Use your personal or institutional subscription to read the fulltext of the article.
|
|
|
|
|
|
|
|
|
|
|
|