Login / Signup
Analysing Applications Layered on Unilaterally Authenticating Protocols.
Thomas Gibson-Robinson
Gavin Lowe
Published in:
Formal Aspects in Security and Trust (2011)
Keyphrases
</>
machine learning
communication protocols
real time
neural network
computer vision
multi party
authentication protocol
data mining
learning algorithm
artificial intelligence
information systems
security protocols
user authentication