The present volume arose from the need for a comprehensive coverage of the state-of-the-art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students.
Read More
The present volume arose from the need for a comprehensive coverage of the state-of-the-art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students.
Read Less