Login / Signup
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity.
Zhiyao Liang
Rakesh M. Verma
Published in:
ICISS (2009)
Keyphrases
</>
cryptographic protocols
computational complexity
np complete
security protocols
real time
linear logic
np hard
theorem proving
insider attacks