Login / Signup
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets.
Ioana Lasc
Reiner Dojen
Tom Coffey
Published in:
Comput. Secur. (2013)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security mechanisms
artificial immune algorithm
secure communication
authentication protocol
security services
cryptographic protocols
security properties
lightweight