Login / Signup
Automating Security Analysis: Symbolic Equivalence of Constraint Systems.
Vincent Cheval
Hubert Comon-Lundh
Stéphanie Delaune
Published in:
IJCAR (2010)
Keyphrases
</>
security analysis
public key
image encryption
security model
computer systems
smart card
authentication protocol