Login / Signup
Analysing Security Protocols Using Refinement in iUML-B.
Colin F. Snook
Thai Son Hoang
Michael J. Butler
Published in:
NFM (2017)
Keyphrases
</>
security protocols
automated design
security properties
security services
key management
cryptographic algorithms
security mechanisms
artificial immune algorithm
secure communication
cryptographic protocols
authentication protocol
response time
data processing
rfid tags