Login / Signup
Proof-Based Design of Security Protocols.
Nazim Benaïssa
Dominique Méry
Published in:
CSR (2010)
Keyphrases
</>
security protocols
automated design
case study
low cost
engineering design
artificial intelligence
cost effective