Login / Signup
An Extended UML Method for the Verification of Security Protocols.
Gang Shen
Xiaohong Li
Ruitao Feng
Guangquan Xu
Jing Hu
Zhiyong Feng
Published in:
ICECCS (2014)
Keyphrases
</>
real time
data mining
object oriented
temporal information
security protocols