From Security Protocols to Pushdown Automata.
Rémy ChrétienVéronique CortierStéphanie DelaunePublished in: ACM Trans. Comput. Log. (2015)
Keyphrases
- security protocols
- automated design
- security properties
- cryptographic algorithms
- security services
- cellular automata
- model checking
- key management
- secure communication
- artificial immune algorithm
- security mechanisms
- authentication protocol
- rfid tags
- cryptographic protocols
- data mining
- database systems
- information systems