- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
It is one of several "symbolic approaches" to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants.



