×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secure systems cryptography]
A Logic of Secure Systems with Tunable Adversary Models
37 views
A Logic of Secure Systems and its Application to Trusted Computing
25 views
A Logic of Secure Systems with Tunable Adversary Models
27 views