Login / Signup
A Coordination-based Methodology for Security Protocol Verification.
Giacomo Baldi
Andrea Bracciali
Gian Luigi Ferrari
Emilio Tuosto
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
security protocols
cryptographic protocols
security services
automated design
cryptographic algorithms
artificial immune algorithm
authentication protocol
key management
multi agent
multi agent systems
model checking