Zobrazeno 1 - 1
of 1
pro vyhledávání: '"Jakob Funder"'
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science ISBN: 9783319042671
ICITS
Lecture Notes in Computer Science ISBN: 9783319042671
ICITS
Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve,