Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking.
Guoqiang ShuDavid LeePublished in: TestCom (2006)
Keyphrases
- security protocols
- security properties
- automated design
- monitoring system
- cryptographic algorithms
- key management
- security services
- artificial immune algorithm
- security mechanisms
- security requirements
- real time
- low cost
- authentication protocol
- secure communication
- access control
- security analysis
- parallel computing
- query processing
- digital libraries
- database systems
- information systems
- databases