Login / Signup
Equivalence Properties by Typing in Cryptographic Branching Protocols.
Véronique Cortier
Niklas Grimm
Joseph Lallemand
Matteo Maffei
Published in:
POST (2018)
Keyphrases
</>
security properties
security protocols
neural network
knowledge base
branch and bound
hash functions
objective function
cellular automata
smart card
search tree
data sharing
cryptographic protocols