Login / Signup
Leakiness is Decidable for Well-Founded Protocols.
Sibylle B. Fröschle
Published in:
POST (2015)
Keyphrases
</>
first order logic
cryptographic protocols
artificial intelligence
security protocols
neural network
website
knowledge representation
peer to peer
transitive closure
datalog programs
authentication protocol