Login / Signup
TAuth: Verifying Timed Security Protocols.
Li Li
Jun Sun
Yang Liu
Jin Song Dong
Published in:
ICFEM (2014)
Keyphrases
</>
security protocols
automated design
petri net
security services
security properties
cryptographic algorithms
authentication protocol
cryptographic protocols
artificial immune algorithm
key management
model checking
security mechanisms
wireless networks
rfid tags
secure communication