Login / Signup
Towards the attacker's view of protocol narrations (or, how to compile security protocols).
Zhiwei Li
Weichao Wang
Published in:
AsiaCCS (2012)
Keyphrases
</>
security protocols
authentication protocol
cryptographic algorithms
cryptographic protocols
automated design
security properties
security services
security mechanisms
secure communication
artificial immune algorithm
key management
data mining
real time
query processing