Login / Signup

Automatic verification of protocols with lists of unbounded length.

Bruno BlanchetMiriam Paiola
Published in: CCS (2013)
Keyphrases
  • neural network
  • fixed length
  • data sets
  • hidden markov models
  • learning algorithm
  • security protocols
  • communication protocols