Login / Signup
Tree automata with one memory set constraints and cryptographic protocols.
Hubert Comon
Véronique Cortier
Published in:
Theor. Comput. Sci. (2005)
Keyphrases
</>
tree automata
cryptographic protocols
cost effective