Login / Signup
Safely Composing Security Protocols.
Véronique Cortier
Jérémie Delaitre
Stéphanie Delaune
Published in:
FSTTCS (2007)
Keyphrases
</>
security protocols
automated design
security properties
security services
key management
cryptographic algorithms
artificial immune algorithm
security mechanisms
rfid tags
cryptographic protocols
secure communication
authentication protocol
security requirements
artificial intelligence