Secrecy for Bounded Security Protocols: Disequality Tests and an Intruder with Existentials Lead to Undecidability.
Catalin V. BîrjoveanuPublished in: BCI (2009)
Keyphrases
- security protocols
- security properties
- key management
- key distribution
- automated design
- security services
- cryptographic algorithms
- artificial immune algorithm
- description logics
- ad hoc networks
- authentication protocol
- security mechanisms
- secure communication
- wireless sensor networks
- cryptographic protocols
- security requirements
- rfid tags
- resource constrained
- information systems
- real time