Secrecy for Bounded Security Protocols under Composed Keys and Disequality Tests.
Catalin V. BîrjoveanuPublished in: SYNASC (2008)
Keyphrases
- security protocols
- security properties
- key management
- key distribution
- secret key
- automated design
- private key
- cryptographic algorithms
- authentication protocol
- security services
- secure communication
- security requirements
- cryptographic protocols
- artificial immune algorithm
- ad hoc networks
- security analysis
- formal model
- smart card
- security mechanisms
- resource constrained
- wireless sensor networks
- digital signature
- data mining
- end to end
- data mining techniques