Login / Signup
How to Prevent Type Flaw Attacks on Security Protocols.
James Heather
Gavin Lowe
Steve A. Schneider
Published in:
J. Comput. Secur. (2003)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
key management
security properties
security services
security mechanisms
cryptographic protocols
secure communication
security requirements
authentication protocol
artificial immune algorithm
database systems
low cost
lightweight
rfid tags