Login / Signup
Automatic verification of protocols with lists of unbounded length.
Bruno Blanchet
Miriam Paiola
Published in:
CCS (2013)
Keyphrases
</>
neural network
fixed length
data sets
hidden markov models
learning algorithm
security protocols
communication protocols