Login / Signup
Efficient solving of string constraints for security analysis.
Clark W. Barrett
Cesare Tinelli
Morgan Deters
Tianyi Liang
Andrew Reynolds
Nestan Tsiskaridze
Published in:
HotSoS (2016)
Keyphrases
</>
security analysis
public key
smart card
data structure
security requirements
security properties
high security
authentication scheme
data mining
lightweight
database applications
fine grained
cost effective
encryption scheme
security model