Login / Signup
Constructing and Reasoning About Security Protocols Using Invariants.
Arjan J. Mooij
Published in:
Electron. Notes Theor. Comput. Sci. (2008)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
artificial immune algorithm
security properties
key management
authentication protocol
security mechanisms
secure communication
databases
artificial intelligence
data mining
information systems
end to end