Login / Signup
Exploiting Symmetries When Proving Equivalence Properties for Security Protocols.
Vincent Cheval
Steve Kremer
Itsaka Rakotonirina
Published in:
CCS (2019)
Keyphrases
</>
security protocols
security properties
automated design
artificial immune algorithm
cryptographic algorithms
information systems
quality of service
rfid tags
security mechanisms