Login / Signup

Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability.

Gergei BanaRohit ChadhaAjay Kumar EerallaMitsuhiro Okada
Published in: ACM Trans. Comput. Log. (2020)
Keyphrases
  • preprocessing
  • significant improvement
  • data sets
  • information retrieval