Login / Signup

Toward Reasoning about Security Protocols: A Semantic Approach.

Arjen HommersomJohn-Jules Ch. MeyerErik P. de Vink
Published in: Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
  • security protocols
  • automated design
  • cryptographic algorithms
  • artificial immune algorithm
  • security services
  • authentication protocol
  • key management
  • security properties
  • secure communication
  • security requirements