Login / Signup

A method for symbolic analysis of security protocols.

Michele BorealeMaria Grazia Buscemi
Published in: Theor. Comput. Sci. (2005)
Keyphrases
  • security protocols
  • data mining
  • similarity measure
  • knowledge management
  • end to end