Login / Signup

Tree automata with one memory set constraints and cryptographic protocols.

Hubert ComonVéronique Cortier
Published in: Theor. Comput. Sci. (2005)
Keyphrases
  • tree automata
  • cryptographic protocols
  • cost effective