Login / Signup
Verification of security protocols with lists: From length one to unbounded length.
Miriam Paiola
Bruno Blanchet
Published in:
J. Comput. Secur. (2013)
Keyphrases
</>
security protocols
data mining
information systems
automated design