Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Thanks for the info. What theorem prover did you use and how do you convert the security rules to a format that the prover understands?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: