Login / Signup
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk.
Jonathan K. Millen
Published in:
WRLA (2000)
Keyphrases
</>
invited talk
term rewriting
data analysis
database
information retrieval
e learning
data model
cryptographic protocols