Login / Signup

To infinity and beyond or, avoiding the infinite in security protocol analysis.

James HeatherSteve A. Schneider
Published in: SAC (2006)
Keyphrases
  • security protocols
  • lightweight
  • data analysis
  • low cost
  • end to end