Login / Signup
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version).
Michele Peroli
Luca Viganò
Matteo Zavatteri
Published in:
Security Protocols Workshop (2014)
Keyphrases
</>
security protocols
automated design
security properties
cryptographic algorithms
security services
authentication protocol
security mechanisms
cryptographic protocols
lightweight
rfid tags
key management
artificial immune algorithm
real time
case study
collaborative learning
secure communication