Login / Signup
No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial.
Yong Li
Sven Schäge
Published in:
CCS (2017)
Keyphrases
</>
security protocols
cryptographic algorithms
security mechanisms
automated design
security services
security properties
watermarking scheme
watermarking technique
authentication protocol
image watermarking
cryptographic protocols
secure communication
artificial immune algorithm
real time
key management