Login / Signup

Leakiness is Decidable for Well-Founded Protocols.

Sibylle B. Fröschle
Published in: POST (2015)
Keyphrases
  • first order logic
  • cryptographic protocols
  • artificial intelligence
  • security protocols
  • neural network
  • website
  • knowledge representation
  • peer to peer
  • transitive closure
  • datalog programs
  • authentication protocol