Login / Signup
Formally verifying security protocols built on watermarking and jamming.
Gabriele Costa
Pierpaolo Degano
Letterio Galletta
Simone Soderi
Published in:
Comput. Secur. (2023)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security services
security mechanisms
security properties
cryptographic protocols
digital images
authentication protocol
secure communication
information systems
data streams
low cost
e government
security requirements
artificial immune algorithm