Login / Signup
Analyzing Security Protocols Using Time-Bounded Task-PIOAs.
Ran Canetti
Ling Cheung
Dilsun Kirli Kaynar
Moses D. Liskov
Nancy A. Lynch
Olivier Pereira
Roberto Segala
Published in:
Discret. Event Dyn. Syst. (2008)
Keyphrases
</>
security protocols
automated design
artificial immune algorithm
security services
cryptographic algorithms
security properties
key management
authentication protocol
secure communication
data warehouse
software engineering
rfid tags