Login / Signup
PS-LTL for Constraint-Based Security Protocol Analysis.
Ricardo Corin
Ari Saptawijaya
Sandro Etalle
Published in:
ICLP (2005)
Keyphrases
</>
security protocols
real time
information systems
software engineering
power consumption
artificial immune algorithm