Search

Your search keyword '"Security protocol implementations"' showing total 2 results

Search Constraints

Start Over You searched for: Descriptor "Security protocol implementations" Remove constraint Descriptor: "Security protocol implementations"
2 results on '"Security protocol implementations"'

Search Results

1. Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

2. Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

Catalog

Books, media, physical & digital resources