Complementing Computational Protocol Analysis
Part of the Advances in Information Security book series (ADIS, volume 41)
KeywordsReachability Graph Dictionary Attack Decryption Oracle Malicious Adversary State Space Analysis
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
© Springer Science+Business Media, LLC 2009