Login / Signup

Synthesis of attack actions using model checking for the verification of security protocols.

Stylianos BasagiannisPanagiotis KatsarosAndrew Pombortsis
Published in: Secur. Commun. Networks (2011)
Keyphrases