Login / Signup
Automated analysis of security protocols with global state.
Steve Kremer
Robert Künnemann
Published in:
J. Comput. Secur. (2016)
Keyphrases
</>
automated analysis
security protocols
automated design
visual analysis
biomedical imaging
real time
computer vision
information systems
image sequences
user interface
video data
video analysis
vocal cord