- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
It is one of several "symbolic approaches" to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants.
-
- 電子書籍
- 氷の富豪と無垢な王女【分冊】 2巻 ハ…
-
- DVD
- 命みじかし、恋せよ乙女



