Security Protocol Testing Using Attack Trees.
Anderson Nunes Paiva MoraisEliane MartinsAna R. CavalliWilly JimenezPublished in: CSE (2) (2009)
Keyphrases
- security protocols
- authentication protocol
- cryptographic algorithms
- artificial immune algorithm
- security services
- block cipher
- automated design
- security measures
- key management
- decision trees
- real time
- secret key
- security requirements
- security properties
- countermeasures
- security mechanisms
- rfid tags
- response time
- penetration testing