Login / Signup
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols.
Cas J. F. Cremers
Published in:
CAV (2008)
Keyphrases
</>
security protocols
data mining
data analysis
automated design