Login / Signup

Modeling Adversaries in a Logic for Security Protocol Analysis.

Joseph Y. HalpernRiccardo Pucella
Published in: FASec (2002)
Keyphrases
  • data analysis
  • security protocols
  • intrusion detection
  • operating system