Login / Signup
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment.
Omar Almousa
Sebastian Mödersheim
Paolo Modesti
Luca Viganò
Published in:
ESORICS (2) (2015)
Keyphrases
</>
security protocols
automated design
security services
security properties
artificial immune algorithm
secure communication
key management
cryptographic algorithms
security mechanisms
authentication protocol
real time
low cost
rfid tags
resource constrained
cryptographic protocols