Login / Signup
Analysing Security Protocols Using Scenario Based Simulation.
Farah Al-Shareefi
Alexei Lisitsa
Clare Dixon
Published in:
VECoS (2019)
Keyphrases
</>
security protocols
automated design
security properties
security services
cryptographic algorithms
authentication protocol
security mechanisms
data streams
data processing
cryptographic protocols
secure communication