Login / Signup
Accountability in Security Protocols.
Robert Künnemann
Deepak Garg
Michael Backes
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
security protocols
automated design
security properties
cryptographic algorithms
security services
key management
security mechanisms
secure communication
artificial immune algorithm
cryptographic protocols
case study
access control
security requirements
authentication protocol
artificial intelligence