Login / Signup
A calculus for control flow analysis of security protocols.
Mikael Buchholtz
Hanne Riis Nielson
Flemming Nielson
Published in:
Int. J. Inf. Sec. (2004)
Keyphrases
</>
flow analysis
security protocols
automated design
information flow
forensic analysis
low cost
key management
artificial immune algorithm
data mining
cryptographic algorithms
security services
security properties
authentication protocol
security mechanisms
data processing
data warehouse
digital libraries