-
821
-
822
-
823
-
824
-
825by Foresti, SaraSubjects: “…Computer security.…”
Published 2011
Full Text via HEAL-Link
Electronic eBook -
826
-
827
-
828
-
829
-
830
-
831
-
832
-
833
-
834
-
835Published 2013Table of Contents: “… Generation of Implementations from Computationally Secure Protocol Specifications -- Sound Security Protocol…”
Full Text via HEAL-Link
Electronic eBook -
836
-
837
-
838
-
839
-
840