Login / Signup
Using logics to detect implementation-dependent flaws [cryptographic protocol design].
Ulf Carlsen
Published in:
ACSAC (1993)
Keyphrases
</>
implementation issues
case study
detection algorithm
design methodology
current status
information systems
detection method
efficient implementation
high dimensional
low cost
design process
similarity search
wireless networks
software architecture
circuit design
cryptographic protocols