Login / Signup
A method for symbolic analysis of security protocols.
Michele Boreale
Maria Grazia Buscemi
Published in:
Theor. Comput. Sci. (2005)
Keyphrases
</>
security protocols
data mining
similarity measure
knowledge management
end to end