Login / Signup
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study.
Aslan Askarov
Andrei Sabelfeld
Published in:
ESORICS (2005)
Keyphrases
</>
cryptographic protocols
security properties
authentication protocol
security protocols
encryption decryption
standard model
insider attacks
security issues
security analysis
databases
sensor networks
lightweight
software systems
information security
key management
data security