Login / Signup
POR for Security Protocol Equivalences: Beyond Action-Determinism.
David Baelde
Stéphanie Delaune
Lucca Hirschi
Published in:
CoRR (2018)
Keyphrases
</>
authentication protocol
security protocols
automated design
security services
cryptographic algorithms
artificial immune algorithm
connected components
security mechanisms
key management
database systems
end users
relational algebra
databases
data mining
information systems
intrusion detection