Login / Signup
Verifying Security Protocols Modelled by Networks of Automata.
Miroslaw Kurkowski
Wojciech Penczek
Published in:
Fundam. Informaticae (2007)
Keyphrases
</>
security protocols
automated design
security services
security properties
cryptographic algorithms
digital libraries
authentication protocol
secure communication
artificial immune algorithm
databases
data mining
software development
computer networks