Login / Signup
Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes.
Emanuele D'Osualdo
Luke Ong
Alwen Tiu
Published in:
CSF (2017)
Keyphrases
</>
security protocols
data mining
automated design
real time
data streams
data management
key management
security properties