Login / Signup
Verified Reference Implementations of WS-Security Protocols.
Karthikeyan Bhargavan
Cédric Fournet
Andrew D. Gordon
Published in:
WS-FM (2006)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
key management
security properties
artificial immune algorithm
cryptographic protocols
security mechanisms
secure communication
authentication protocol
power consumption