Login / Signup
Sufficient conditions for vertical composition of security protocols.
Sebastian Mödersheim
Luca Viganò
Published in:
AsiaCCS (2014)
Keyphrases
</>
sufficient conditions
security protocols
automated design
security properties
key management
security mechanisms
asymptotic stability
linear complementarity problem
lyapunov function
linear systems
artificial immune algorithm
rfid tags
security requirements
exponential stability
low cost
efficiently computable