Login / Signup

PS-LTL for Constraint-Based Security Protocol Analysis.

Ricardo CorinAri SaptawijayaSandro Etalle
Published in: ICLP (2005)
Keyphrases
  • security protocols
  • real time
  • information systems
  • software engineering
  • power consumption
  • artificial immune algorithm