Login / Signup
Automated analysis of cryptographic protocols using Mur-phi.
John C. Mitchell
Mark Mitchell
Ulrich Stern
Published in:
IEEE Symposium on Security and Privacy (1997)
Keyphrases
</>
automated analysis
cryptographic protocols
visual analysis
standard model
biomedical imaging
security protocols
authentication protocol
video analysis
encryption decryption
database
security analysis
formal verification
private information retrieval