Login / Signup

Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.

Sebastian MödersheimLuca ViganòDavid A. Basin
Published in: J. Comput. Secur. (2010)
Keyphrases
  • search space reduction
  • security protocols
  • data analysis
  • real time
  • cost function
  • data warehouse