Login / Signup
Strand Spaces: Proving Security Protocols Correct.
F. Javier Thayer
Jonathan C. Herzog
Joshua D. Guttman
Published in:
J. Comput. Secur. (1999)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security services
security properties
artificial immune algorithm
secure communication
authentication protocol
security mechanisms
key management
cryptographic protocols
case study
distributed systems
data processing
operating system
rfid tags