Login / Signup
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif.
Bruno Blanchet
Published in:
Found. Trends Priv. Secur. (2016)
Keyphrases
</>
security protocols
automated design
databases
data mining
case study
data distribution
security services
artificial immune algorithm