Proved generation of implementations from computationally secure protocol specifications

From MaRDI portal
Publication:5326754








Describes a project that uses

Uses Software





This page was built for publication: Proved generation of implementations from computationally secure protocol specifications

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5326754)