Authenticity by Typing for Security Protocols.
Andrew D. GordonAlan JeffreyPublished in: J. Comput. Secur. (2003)
Keyphrases
- security protocols
- digital images
- automated design
- security properties
- cryptographic algorithms
- key management
- security services
- secure communication
- artificial immune algorithm
- security mechanisms
- cryptographic protocols
- authentication protocol
- security requirements
- ad hoc networks
- end to end
- rfid tags
- artificial intelligence