Login / Signup
Symbolically analyzing security protocols using tamarin.
David A. Basin
Cas Cremers
Jannik Dreier
Ralf Sasse
Published in:
ACM SIGLOG News (2017)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
key management
security properties
artificial immune algorithm
security mechanisms
secure communication
authentication protocol
security services
sensor networks
rfid tags
cryptographic protocols
real time
lightweight