Login / Signup

Modeling and Verifying Time Sensitive Security Protocols with Constraints.

Ti ZhouMengjun LiZhoujun LiHuowang Chen
Published in: Electron. Notes Theor. Comput. Sci. (2008)
Keyphrases
  • security protocols
  • automated design
  • key management
  • security properties
  • databases
  • artificial immune algorithm
  • model checking
  • cryptographic protocols
  • cryptographic algorithms