Login / Signup

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols.

Vincent ChevalSteve KremerItsaka Rakotonirina
Published in: CCS (2019)
Keyphrases
  • security protocols
  • security properties
  • automated design
  • artificial immune algorithm
  • cryptographic algorithms
  • information systems
  • quality of service
  • rfid tags
  • security mechanisms