Evaluation of anonymity and confidentiality protocols using theorem proving
Crossref DOI link: https://doi.org/10.1007/s10703-015-0232-5
Published Online: 2015-06-20
Published Print: 2015-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Mhamdi, Tarek
Hasan, Osman
Tahar, Sofiène
Text and Data Mining valid from 2015-06-20