Login / Signup
POR for Security Protocol Equivalences - Beyond Action-Determinism.
David Baelde
Stéphanie Delaune
Lucca Hirschi
Published in:
ESORICS (1) (2018)
Keyphrases
</>
security protocols
security services
artificial immune algorithm
cryptographic algorithms
automated design
connected components
security mechanisms
key management
authentication protocol
real time
databases
information systems
rfid tags
rfid systems