Login / Signup
The Simplified Inductive Approach to Verifying Security Protocols.
Juan Wang
Yajie Zhou
Huanguo Zhang
Published in:
ISECS (2008)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
security properties
secure communication
cryptographic protocols
model checking
security mechanisms
key management
authentication protocol
artificial immune algorithm
real time
computer systems