Login / Signup
Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
Cas Cremers
Charlie Jacomme
Philip Lukert
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
security protocols
wireless sensor networks
key management