Login / Signup

Equivalence Properties by Typing in Cryptographic Branching Protocols.

Véronique CortierNiklas GrimmJoseph LallemandMatteo Maffei
Published in: POST (2018)
Keyphrases
  • security properties
  • security protocols
  • neural network
  • knowledge base
  • branch and bound
  • hash functions
  • objective function
  • cellular automata
  • smart card
  • search tree
  • data sharing
  • cryptographic protocols