Article,

On using probabilistic Turing machines to model participants in cryptographic protocols.

, , and .
Theor. Comput. Sci., (2013)

Meta data

Tags

    Users

    Comments and Reviews