Login / Signup

On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.

Yongyuth PermpoontanalarpPanupong Sornkhom
Published in: Fundam. Informaticae (2014)
Keyphrases
  • security analysis
  • data model
  • quadtree
  • cryptographic protocols