Login / Signup
How to Prevent Type Flaw Attacks on Security Protocols.
James Heather
Gavin Lowe
Steve A. Schneider
Published in:
CSFW (2000)
Keyphrases
</>
security protocols
cryptographic algorithms
automated design
security mechanisms
security properties
security services
key management
cryptographic protocols
artificial immune algorithm
secure communication
authentication protocol
security requirements
data streams
digital libraries
rfid tags