Sign in
Typing One-to-One and One-to-Many Correspondences in Security Protocols.
Andrew D. Gordon
Alan Jeffrey
Published in:
ISSS (2002)
Keyphrases
</>
security protocols
automated design
security services
key management
cryptographic algorithms
security properties
artificial immune algorithm
authentication protocol
security mechanisms
point correspondences
rfid tags
cryptographic protocols
secure communication
security requirements