Login / Signup

Verification of Security Protocols with Lists: From Length One to Unbounded Length.

Miriam PaiolaBruno Blanchet
Published in: POST (2012)
Keyphrases
  • security protocols
  • artificial intelligence
  • model checking
  • automated design