Login / Signup
Knowledge Based Approach for Mechanically Verifying Security Protocols.
Xiaoqi Ma
Xiaochun Cheng
Rachel McCrindle
Published in:
IJCAI (2005)
Keyphrases
</>
security protocols
knowledge base
knowledge management
automated design
real time
artificial intelligence
data mining techniques
lightweight
cost effective
model checking
security services
artificial immune algorithm