Login / Signup

A Logic for Constraint-based Security Protocol Analysis.

Ricardo CorinSandro EtalleAri Saptawijaya
Published in: IEEE Symposium on Security and Privacy (2006)
Keyphrases
  • data analysis
  • security protocols
  • real time
  • response time
  • security services