Login / Signup
Multiset rewriting and the complexity of bounded security protocols.
Nancy A. Durgin
Patrick Lincoln
John C. Mitchell
Published in:
J. Comput. Secur. (2004)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security properties
artificial immune algorithm
databases
real time
security requirements
security mechanisms