Login / Signup
Gaining trust by tracing security protocols.
Lars-Åke Fredlund
Clara Benac Earle
Thomas Arts
Hans Svensson
Published in:
Erlang Workshop (2019)
Keyphrases
</>
security protocols
security services
automated design
trust model
cryptographic algorithms
security mechanisms
authentication protocol
security properties
secure communication
artificial immune algorithm
key management
personal information
trust relationships
public key infrastructure