Login / Signup
Verifying Second-Level Security Protocols.
Giampaolo Bella
Cristiano Longo
Lawrence C. Paulson
Published in:
TPHOLs (2003)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security properties
artificial immune algorithm
cryptographic protocols
artificial intelligence
lightweight
energy consumption
model checking