Login / Signup
Verified Interoperable Implementations of Security Protocols.
Karthikeyan Bhargavan
Cédric Fournet
Andrew D. Gordon
Stephen Tse
Published in:
CSFW (2006)
Keyphrases
</>
security protocols
automated design
security services
security properties
cryptographic algorithms
metadata
authentication protocol
key management
artificial immune algorithm
web services
security mechanisms
rfid tags
digital libraries
security requirements
secure communication
data mining