Login / Signup
Verifying Security Protocols using Dynamic Strategies.
Yan Xiong
Cheng Su
Wenchao Huang
Published in:
CoRR (2018)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
cryptographic protocols
dynamic environments
security services
security properties
artificial immune algorithm