Login / Signup

Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity.

Zhiyao LiangRakesh M. Verma
Published in: ICISS (2009)
Keyphrases
  • cryptographic protocols
  • computational complexity
  • np complete
  • security protocols
  • real time
  • linear logic
  • np hard
  • theorem proving
  • insider attacks