Login / Signup
Strand Spaces: Why is a Security Protocol Correct?
F. Javier Thayer
Jonathan C. Herzog
Joshua D. Guttman
Published in:
IEEE Symposium on Security and Privacy (1998)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
artificial immune algorithm
security mechanisms
key management
information systems
rfid systems
real time
web services
end to end
security requirements