Login / Signup
Validation of security protocol implementations from security objectives.
Yulong Fu
Ousmane Koné
Published in:
Comput. Secur. (2013)
Keyphrases
</>
security protocols
security services
security properties
cryptographic algorithms
security mechanisms
key management
authentication protocol
security requirements
security measures
artificial immune algorithm
security issues
rfid systems
low cost
rfid tags