Composing security protocols: from confidentiality to privacy.
Myrto ArapinisVincent ChevalStéphanie DelaunePublished in: CoRR (2014)
Keyphrases
- security properties
- security protocols
- security services
- authentication protocol
- security mechanisms
- automated design
- cryptographic algorithms
- security issues
- information security
- security requirements
- cryptographic protocols
- security analysis
- key management
- artificial immune algorithm
- real time
- data confidentiality
- data quality
- access control
- sensitive data
- public key
- formal model
- smart card