Login / Signup
Deciding knowledge in security protocols under equational theories.
Martín Abadi
Véronique Cortier
Published in:
Theor. Comput. Sci. (2006)
Keyphrases
</>
security protocols
equational theories
automated design
knowledge base
expert systems
knowledge management
database systems
low cost
cost effective