@dblp

Basing Cryptographic Protocols on Tamper-Evident Seals.

, and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 285-297. Springer, (2005)

Links and resources

Tags