Login / Signup

Automating Security Analysis: Symbolic Equivalence of Constraint Systems.

Vincent ChevalHubert Comon-LundhStéphanie Delaune
Published in: IJCAR (2010)
Keyphrases
  • security analysis
  • public key
  • image encryption
  • security model
  • computer systems
  • smart card
  • authentication protocol