Abstract: An approach to analyzing encryption protocols using machine-aided formal verification techniques is presented. The properties that the protocol should preserve are expressed as state ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results