Justifying Finite Resources for Adversaries in Automated Analysis of Authentication Protocols

dc.contributor.authorStoller, Scott
dc.date.accessioned2025-11-11T22:45:40Z
dc.date.available2025-11-11T22:45:40Z
dc.date.issued1998-03
dc.identifier.urihttps://hdl.handle.net/2022/34348
dc.relation.ispartofseriesIndiana University Computer Science Technical Reports; TR506
dc.rightsThis work is protected by copyright unless stated otherwise.
dc.rights.uri
dc.titleJustifying Finite Resources for Adversaries in Automated Analysis of Authentication Protocols

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR506.pdf
Size:
309.05 KB
Format:
Adobe Portable Document Format
Can’t use the file because of accessibility barriers? Contact us