Login / Signup
Developing security protocols by refinement.
Christoph Sprenger
David A. Basin
Published in:
CCS (2010)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security properties
artificial immune algorithm
key management
security services
authentication protocol
digital libraries
security requirements
database systems
wireless networks
security mechanisms
secure communication