Login / Signup

Verifying Second-Level Security Protocols.

Giampaolo BellaCristiano LongoLawrence C. Paulson
Published in: TPHOLs (2003)
Keyphrases
  • security protocols
  • automated design
  • cryptographic algorithms
  • security properties
  • artificial immune algorithm
  • cryptographic protocols
  • artificial intelligence
  • lightweight
  • energy consumption
  • model checking