Login / Signup
A Comparative Analysis of Tools for Verification of Security Protocols.
Nitish Dalal
Jenny Shah
Khushboo Hisaria
Devesh Jinwala
Published in:
Int. J. Commun. Netw. Syst. Sci. (2010)
Keyphrases
</>
security protocols
cryptographic protocols
automated design
security properties
formal methods
security services
authentication protocol
cryptographic algorithms
secure communication
artificial immune algorithm