Experience Report: How to Extract Security Protocols' Specifications from C Libraries.
Itzel Vázquez SandovalGabriele LenziniPublished in: COMPSAC (2) (2018)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- artificial immune algorithm
- security properties
- security services
- software engineering
- formal specification
- security requirements
- authentication protocol
- cryptographic protocols
- secure communication
- artificial intelligence
- digital libraries
- knowledge management
- data management