Login / Signup
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker.
Gergei Bana
Pedro Adão
Hideki Sakurada
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
lightweight
real time
multi agent systems
model checking
cryptographic protocols
formal proof
high level
multi agent
model checker