Login / Signup
Compiling symbolic attacks to protocol implementation tests.
Hatem Ghabri
Ghazi Maatoug
Michaël Rusinowitch
Published in:
SCSS (2012)
Keyphrases
</>
cryptographic protocols
security protocols
high level
denial of service attacks
lightweight
cryptographic algorithms
wireless sensor networks
watermarking scheme
countermeasures
symbolic representation
authentication protocol
secure routing