Verifying layered security protocols.
Thomas Gibson-RobinsonAllaa KamilGavin LowePublished in: J. Comput. Secur. (2015)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security properties
- security services
- security mechanisms
- artificial immune algorithm
- key management
- model checking
- authentication protocol
- artificial intelligence
- cryptographic protocols
- security requirements
- data mining
- operating system
- secure communication