First Page | Document Content | |
---|---|---|
Date: 2013-12-09 08:45:52 | Finding Security Vulnerabilities in a Network Protocol Using Formal Verification Methods Orna Grumberg Technion, Israel Joint work with Adi Sosnovich and Gabi NakiblyAdd to Reading ListSource URL: www.cs.tau.ac.ilDownload Document from Source WebsiteFile Size: 1.007,54 KBShare Document on Facebook |