Login / Signup

An Extended UML Method for the Verification of Security Protocols.

Gang ShenXiaohong LiRuitao FengGuangquan XuJing HuZhiyong Feng
Published in: ICECCS (2014)
Keyphrases
  • real time
  • data mining
  • object oriented
  • temporal information
  • security protocols