Adversaries and information leaks (Tutorial (2007)

by G Smith
Venue:Proc. 3rd Symp. Trustworthy Global Computing, volume 4912 of LNCS