Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
- Sebastian Mödersheim
- Luca Viganò
- et al.
- 2010
- Journal of Computer Security
This is our catalog of publications authored by IBM researchers, in collaboration with the global research community. It’s an ever-growing body of work that shows why IBM is one of the most important contributors to modern computing.