Login / Signup
Provable Implementations of Security Protocols.
Andrew D. Gordon
Published in:
LICS (2006)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security properties
key management
security mechanisms
authentication protocol
secure communication
security services
cryptographic protocols
artificial immune algorithm
end to end