Login / Signup
Toward Reasoning about Security Protocols: A Semantic Approach.
Arjen Hommersom
John-Jules Ch. Meyer
Erik P. de Vink
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
artificial immune algorithm
security services
authentication protocol
key management
security properties
secure communication
security requirements