Login / Signup
Proving Security Protocols with Model Checkers by Data Independence Techniques.
A. W. Roscoe
Philippa J. Broadfoot
Published in:
J. Comput. Secur. (1999)
Keyphrases
</>
security protocols
database
data analysis
times faster
formal model
data mining
general purpose