A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols.
Giancarlo PellegrinoLuca CompagnaThomas MorreggiaPublished in: ICTSS (2013)
Keyphrases
- security protocols
- security services
- security properties
- automated design
- cryptographic algorithms
- security mechanisms
- key management
- authentication protocol
- security requirements
- cryptographic protocols
- open source
- secure communication
- artificial immune algorithm
- rfid tags
- software engineering
- software development
- remote attestation
- security systems
- security issues
- lightweight
- end users