Login / Signup

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice.

Vincent ChevalSteve KremerItsaka Rakotonirina
Published in: IEEE Symposium on Security and Privacy (2018)
Keyphrases
  • security protocols
  • automated design
  • security properties
  • key management
  • security services
  • artificial intelligence
  • authentication protocol
  • artificial immune algorithm
  • security requirements