Login / Signup
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
Anca D. Jurcut
Tom Coffey
Reiner Dojen
Published in:
J. Commun. (2013)
Keyphrases
</>
security protocols
cryptographic protocols
automated design
security properties
model checking
real time
security services
secure communication
artificial immune algorithm
key management
authentication protocol
database systems
cost effective
cryptographic algorithms