Login / Signup
A comparison between strand spaces and multiset rewriting for security protocol analysis.
Iliano Cervesato
Nancy A. Durgin
Patrick Lincoln
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
security protocols
real time
similarity search