Formal Specification and Verification of the Intrusion--Tolerant Enclaves Protocol
SourceInternational Journal of Network Security, 5, 3, (2007), pp. 288-298
Article / Letter to editor
Display more detailsDisplay less details
Informatics for Technical Applications
International Journal of Network Security
Upload full text
Use your RU credentials (u/z-number and password) to log in with SURFconext to upload a file for processing by the repository team.