Login / Signup

Verification of security protocols with lists: From length one to unbounded length.

Miriam PaiolaBruno Blanchet
Published in: J. Comput. Secur. (2013)
Keyphrases
  • security protocols
  • data mining
  • information systems
  • automated design