Login / Signup
Some new attacks upon security protocols.
Gavin Lowe
Published in:
CSFW (1996)
Keyphrases
</>
security protocols
cryptographic algorithms
automated design
security properties
authentication protocol
security mechanisms
artificial immune algorithm
security services
key management
secure communication
cryptographic protocols
rfid tags
real time
security requirements