Assumptions: The Trojan Horses of Secure Protocols
Keyword(s):
2009 ◽
Vol 13
(1)
◽
pp. 1-35
◽