Login / Signup

Improving Automatic Verification of Security Protocols with XOR.

Xihui ChenTon van DeursenJun Pang
Published in: ICFEM (2009)
Keyphrases
  • security protocols
  • security services
  • automated design
  • artificial immune algorithm
  • security properties
  • cryptographic algorithms
  • key management
  • real time
  • ad hoc networks
  • cryptographic protocols