Login / Signup
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Ti Zhou
Mengjun Li
Zhoujun Li
Huowang Chen
Published in:
Electron. Notes Theor. Comput. Sci. (2008)
Keyphrases
</>
security protocols
automated design
key management
security properties
databases
artificial immune algorithm
model checking
cryptographic protocols
cryptographic algorithms