↓ Skip to main content

Theory of Security and Applications

Overview of attention for book
Attention for Chapter 2: Secure Composition of Protocols
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
4 Mendeley