An Improved Constraint-Based System for the Verification of Security Protocols.
Ricardo CorinSandro EtallePublished in: SAS (2002)
Keyphrases
- security protocols
- cryptographic protocols
- automated design
- security services
- key management
- security properties
- cryptographic algorithms
- artificial immune algorithm
- model checking
- secure communication
- security mechanisms
- authentication protocol
- information systems
- security requirements
- rfid tags
- high security
- cost effective
- operating system