Login / Signup
Automatic generation of security protocols attacks specifications and implementations.
Rémi Garcia
Paolo Modesti
Published in:
Cyber Secur. Appl. (2024)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security mechanisms
security properties
security services
key management
authentication protocol
formal specification
cryptographic protocols
secure communication
artificial immune algorithm
low cost
rfid tags