Login / Signup
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Sreekanth Malladi
Published in:
CoRR (2010)
Keyphrases
</>
security protocols
cryptographic protocols
cryptographic algorithms
automated design
authentication protocol
security services
security properties
secure communication
security mechanisms
key management
artificial immune algorithm
information systems
key distribution