Login / Signup
Some Remarks on Security Protocols Verification Tools.
Miroslaw Kurkowski
Adam Kozakiewicz
Olga Siedlecka-Lamch
Published in:
ISAT (2) (2016)
Keyphrases
</>
security protocols
automated design
cryptographic protocols
artificial immune algorithm
formal methods
security services
cryptographic algorithms
end users
key management
databases
model checking
real time
artificial intelligence
resource constrained
security mechanisms
security properties