Sign in
Authenticity by Typing for Security Protocols.
Andrew D. Gordon
Alan Jeffrey
Published in:
CSFW (2001)
Keyphrases
</>
security protocols
digital images
security services
automated design
security properties
security mechanisms
cryptographic algorithms
key management
authentication protocol
artificial immune algorithm
secure communication
rfid tags
cryptographic protocols
cost effective
information systems