Login / Signup
Deciding Knowledge in Security Protocols under (Many More) Equational Theories.
Martín Abadi
Véronique Cortier
Published in:
CSFW (2005)
Keyphrases
</>
security protocols
equational theories
knowledge base
database systems
knowledge management
automated design
artificial immune algorithm
knowledge representation
object oriented
background knowledge
security properties