On the Automatic Analysis of Recursive Security Protocols with XOR.
Ralf KüstersTomasz TruderungPublished in: STACS (2007)
Keyphrases
- automatic analysis
- security protocols
- automated design
- security services
- cryptographic algorithms
- security properties
- artificial immune algorithm
- key management
- secure communication
- authentication protocol
- security mechanisms
- rfid tags
- low cost
- data mining
- security requirements
- security issues
- e government
- web services
- information systems