Login / Signup

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols.

Cas J. F. Cremers
Published in: CAV (2008)
Keyphrases
  • security protocols
  • data mining
  • data analysis
  • automated design