Login / Signup
Computing Knowledge in Security Protocols Under Convergent Equational Theories.
Stefan Ciobaca
Stéphanie Delaune
Steve Kremer
Published in:
J. Autom. Reason. (2012)
Keyphrases
</>
security protocols
equational theories
expert systems
knowledge representation
automated design
knowledge base
databases
logic programming
software systems
engineering design
key management
artificial immune algorithm