Login / Signup
On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.
Yongyuth Permpoontanalarp
Panupong Sornkhom
Published in:
Fundam. Informaticae (2014)
Keyphrases
</>
security analysis
data model
quadtree
cryptographic protocols