No. | Title | Author | Year |
---|---|---|---|
1 | Modeling Computational Security in Long-Lived Systems | Canetti, Ran et al. | 2009 |
2 | Simulation based security in the applied pi calculus | Delaune, Stéphanie et al. | 2009 |
3 | Simulation-based analysis of E2E voting systems | de Marneffe, Olivier et al. | 2008 |
Current Page : | |
Number of result pages: | 1 |
Number of documents: | 3 |