A First Step Towards the Automatic Generation of Security Protocols.
Adrian PerrigDawn Xiaodong SongPublished in: NDSS (2000)
Keyphrases
- security protocols
- automated design
- security services
- automatically generate
- cryptographic algorithms
- security properties
- artificial immune algorithm
- security mechanisms
- key management
- data mining
- data management
- software systems
- engineering design
- authentication protocol
- cryptographic protocols
- secure communication