Login / Signup
Using Rely/Guarantee to Pinpoint Assumptions underlying Security Protocols.
Nisansala P. Yatapanage
Cliff B. Jones
Published in:
CoRR (2023)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
key management
security properties
artificial immune algorithm
security mechanisms
authentication protocol
databases
secure communication
security requirements
database systems
wireless sensor networks
cryptographic protocols