Login / Signup

Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif.

Bruno Blanchet
Published in: Found. Trends Priv. Secur. (2016)
Keyphrases
  • security protocols
  • automated design
  • databases
  • data mining
  • case study
  • data distribution
  • security services
  • artificial immune algorithm