Login / Signup
On BAN Logics for Industrial Security Protocols.
Nesria Agray
Wiebe van der Hoek
Erik P. de Vink
Published in:
CEEMAS (2001)
Keyphrases
</>
security protocols
automated design
security services
security properties
cryptographic algorithms
expressive power
artificial immune algorithm
key management
secure communication
security mechanisms
authentication protocol
modal logic
cryptographic protocols
real time
data mining