Login / Signup
A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols.
Noureddine Aribi
Yahia Lebbah
Published in:
Int. J. Inf. Secur. Priv. (2020)
Keyphrases
</>
cryptographic protocols
ai planning
planning problems
security protocols
planning domains
standard model
security properties
classical planning
insider attacks
heuristic search
authentication protocol
database
private information retrieval
plan quality
answer set programming
data streams
real time