Login / Signup
Abstractions for Security Protocol Verification.
Thanh Binh Nguyen
Christoph Sprenger
Published in:
POST (2015)
Keyphrases
</>
security protocols
cryptographic protocols
artificial immune algorithm
cryptographic algorithms
automated design
authentication protocol
security services
key management
model checking
security mechanisms
low cost
real time
databases
security requirements