Cost-aware secure protocol design and analysis

Full text