1.
Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no con[...]
2012 | doctoral dissertations |