Login / Signup
Verification of Security Protocols with Lists: From Length One to Unbounded Length.
Miriam Paiola
Bruno Blanchet
Published in:
POST (2012)
Keyphrases
</>
security protocols
artificial intelligence
model checking
automated design