Sort by AttachmentsUse SHIFT+ENTER to open the menu (new window).
DetailsFilter
  
Formal specification and verification of security policies.
The analysis of information flow in multi-agent systems.
The analysis of cryptographic-key distribution schemes.
Cryptographic protocols specification and verification.