Article,

Time-based security explained: Provable security models and formulas for the practitioner and vendor.

.
Comput. Secur., 17 (8): 693-714 (1998)

Meta data

Tags

Users

  • @dblp

Comments and Reviews