Login / Signup
Formally Analysing a Security Protocol for Replay Attacks.
Benjamin W. Long
Colin J. Fidge
Published in:
ASWEC (2006)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security services
security properties
security mechanisms
key management
authentication protocol
artificial immune algorithm
rfid tags
cryptographic protocols
real time
end users
security measures