Login / Signup
Strategy for Verifying Security Protocols with Unbounded Message Size.
Yannick Chevalier
Laurent Vigneron
Published in:
Autom. Softw. Eng. (2004)
Keyphrases
</>
security protocols
automated design
security services
security properties
cryptographic algorithms
artificial intelligence
email
secure communication
databases
data mining
response time
rfid tags
artificial immune algorithm