Login / Signup
No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial.
Yong Li
Sven Schäge
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
security protocols
cryptographic algorithms
automated design
security mechanisms
security services
security properties
secure communication
authentication protocol
artificial immune algorithm
rfid tags
cryptographic protocols
operating system
security issues
security requirements