Secrecy in Security Protocols as Non Interference.
Riccardo FocardiRoberto GorrieriFabio MartinelliPublished in: Electron. Notes Theor. Comput. Sci. (2000)
Keyphrases
- security protocols
- security properties
- key management
- key distribution
- automated design
- security services
- resource constrained
- cryptographic algorithms
- secure communication
- wireless sensor networks
- ad hoc networks
- multipath
- artificial immune algorithm
- elliptic curve
- secret key
- security requirements
- authentication protocol
- security mechanisms
- rfid tags
- cryptographic protocols
- routing protocol
- peer to peer