Justifying Finite Resources for Adversaries in Automated Analysis of Authentication Protocols
| dc.contributor.author | Stoller, Scott | |
| dc.date.accessioned | 2025-11-11T22:45:40Z | |
| dc.date.available | 2025-11-11T22:45:40Z | |
| dc.date.issued | 1998-03 | |
| dc.identifier.uri | https://hdl.handle.net/2022/34348 | |
| dc.relation.ispartofseries | Indiana University Computer Science Technical Reports; TR506 | |
| dc.rights | This work is protected by copyright unless stated otherwise. | |
| dc.rights.uri | ||
| dc.title | Justifying Finite Resources for Adversaries in Automated Analysis of Authentication Protocols |
Files
Original bundle
1 - 1 of 1
Collections
Can’t use the file because of accessibility barriers? Contact us