Login / Signup

Proof-Based Design of Security Protocols.

Nazim BenaïssaDominique Méry
Published in: CSR (2010)
Keyphrases
  • security protocols
  • automated design
  • case study
  • low cost
  • engineering design
  • artificial intelligence
  • cost effective