Login / Signup
Computing Knowledge in Security Protocols under Convergent Equational Theories.
Stefan Ciobaca
Stéphanie Delaune
Steve Kremer
Published in:
CADE (2009)
Keyphrases
</>
security protocols
equational theories
knowledge base
expert systems
automated design
real time
databases
digital libraries
knowledge representation
data mining techniques
key management
artificial immune algorithm