Login / Signup
Automated analysis of security protocols with global state.
Steve Kremer
Robert Künnemann
Published in:
CoRR (2014)
Keyphrases
</>
automated analysis
security protocols
automated design
information retrieval
visual analysis
biomedical imaging
databases
artificial immune algorithm
data processing