Login / Signup
Security protocols, properties, and their monitoring.
Andreas Bauer
Jan Jürjens
Published in:
SESS (2008)
Keyphrases
</>
security protocols
real time
security properties
security services
automated design
monitoring system
artificial intelligence
data processing
resource constrained
security mechanisms
cryptographic protocols