Sign in

Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes.

Emanuele D'OsualdoLuke OngAlwen Tiu
Published in: CSF (2017)
Keyphrases
  • security protocols
  • data mining
  • automated design
  • real time
  • data streams
  • data management
  • key management
  • security properties