Check out the new USENIX Web site. next up previous
Next: Legal Signatures and Proof Up: Notes from the Second Previous: Verifying Cryptographic Protocols for

Invited Talk



 

Alma Whitten
1998-07-21