Login / Signup

Modeling Human Errors in Security Protocols.

David A. BasinSasa RadomirovicLara Schmid
Published in: CSF (2016)
Keyphrases
  • security protocols
  • human errors
  • automated design
  • scoring methods
  • database
  • authentication protocol