Keyphrases
- security protocols
- cryptographic protocols
- automated design
- security properties
- cryptographic algorithms
- security services
- key management
- model checking
- artificial immune algorithm
- security mechanisms
- authentication protocol
- secure communication
- formal verification
- rfid tags
- data processing
- data streams
- end to end
- operating system