Attack Interference: A Path to Defending Security Protocols.
Maria-Camilla FiazzaMichele PeroliLuca ViganòPublished in: ICETE (Selected Papers) (2011)
Keyphrases
- security protocols
- authentication protocol
- ddos attacks
- automated design
- wireless mesh networks
- security services
- security properties
- key management
- cryptographic algorithms
- shortest path
- artificial immune algorithm
- secure communication
- security mechanisms
- secret key
- cryptographic protocols
- security requirements
- rfid tags
- formal model