Login / Signup

Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA.

Daniel J. DoughertyJoshua D. GuttmanJohn D. Ramsdell
Published in: IFM (2018)
Keyphrases
  • security protocols
  • data analysis
  • databases