Protocols are programs too: the meta-heuristic search for security protocols.
John A. ClarkJeremy L. JacobPublished in: Inf. Softw. Technol. (2001)
Keyphrases
- heuristic search
- security protocols
- automated design
- search algorithm
- search space
- security services
- security properties
- state space
- authentication protocol
- cryptographic protocols
- planning problems
- security mechanisms
- key management
- automated planning
- heuristic search algorithms
- search problems
- search strategies
- rfid tags
- bidirectional search
- information systems
- access control
- machine learning