Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries.
Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries.
(xsd:string)
Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries.
(xsd:string)