Login / Signup
Typing Messages for Free in Security Protocols: The Case of Equivalence Properties.
Rémy Chrétien
Véronique Cortier
Stéphanie Delaune
Published in:
CONCUR (2014)
Keyphrases
</>
security protocols
security properties
automated design
email
artificial immune algorithm
security services
security mechanisms
sensor networks
low cost
security requirements
key management
cryptographic protocols