Login / Signup

Verifying multicast-based security protocols using the inductive method.

Jean Everson MartinaLawrence C. Paulson
Published in: SAC (2013)
Keyphrases
  • databases
  • data mining
  • similarity measure
  • response time
  • wireless networks
  • computer networks