Login / Signup

Efficient representation of the attacker's knowledge in cryptographic protocols analysis.

Ivan Cibrario BertolottiLuca DuranteRiccardo SistoAdriano Valenzano
Published in: Formal Aspects Comput. (2008)
Keyphrases
  • knowledge management
  • cost effective
  • power consumption
  • standard model
  • cryptographic protocols