Reasoning about minimal anonymity in security protocols.
Ferucio Laurentiu TipleaLoredana VamanuCosmin VârlanPublished in: Future Gener. Comput. Syst. (2013)
Keyphrases
- security protocols
- security properties
- automated design
- security services
- cryptographic algorithms
- artificial immune algorithm
- key management
- authentication protocol
- security mechanisms
- cryptographic protocols
- security requirements
- rfid tags
- secure communication
- information systems
- security analysis
- low cost
- query processing