Login / Signup
Normal Attacks on Security Protocols.
Hubert Comon-Lundh
Published in:
Abstract State Machines (2005)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security services
security mechanisms
security properties
key management
authentication protocol
cryptographic protocols
secure communication
artificial immune algorithm
operating system
rfid tags