Login / Signup
Safely composing security protocols.
Véronique Cortier
Stéphanie Delaune
Published in:
Formal Methods Syst. Des. (2009)
Keyphrases
</>
security protocols
automated design
security services
security mechanisms
security properties
cryptographic algorithms
artificial immune algorithm
authentication protocol
cryptographic protocols
data processing
rfid tags
real time
databases
data mining
secure communication