Login / Signup
Improving Automatic Verification of Security Protocols with XOR.
Xihui Chen
Ton van Deursen
Jun Pang
Published in:
ICFEM (2009)
Keyphrases
</>
security protocols
security services
automated design
artificial immune algorithm
security properties
cryptographic algorithms
key management
real time
ad hoc networks
cryptographic protocols