Design requirements to counter parallel session attacks in security protocols.
Anca D. JurcutTom CoffeyReiner DojenPublished in: PST (2014)
Keyphrases
- security protocols
- design requirements
- automated design
- cryptographic algorithms
- security properties
- key management
- security mechanisms
- design process
- artificial immune algorithm
- design patterns
- authentication protocol
- cryptographic protocols
- design space
- security requirements
- expert systems
- parallel computing
- smart card
- access control
- low cost
- database