Login / Signup
A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties.
Véronique Cortier
Stéphanie Delaune
Vaishnavi Sundararajan
Published in:
J. Autom. Reason. (2021)
Keyphrases
</>
security protocols
automated design
transitive closure
security properties
cryptographic algorithms
artificial immune algorithm
databases
key management
datalog programs
conjunctive queries
security requirements
security mechanisms
cryptographic protocols
security services