Login / Signup
Performance Evaluation of Security Protocols Specified in LySa.
Chiara Bodei
Michele Curti
Pierpaolo Degano
Mikael Buchholtz
Flemming Nielson
Hanne Riis Nielson
Corrado Priami
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
security protocols
automated design
security properties
security services
cryptographic algorithms
key management
security mechanisms
authentication protocol
cryptographic protocols
artificial immune algorithm
secure communication
databases
real time