Login / Signup

The concept of layered proving trees and its application to the automation of security protocol verification.

Reiner DojenTom Coffey
Published in: ACM Trans. Inf. Syst. Secur. (2005)
Keyphrases
  • security protocols
  • artificial immune algorithm
  • decision trees
  • cryptographic protocols
  • security services
  • automated design
  • end users
  • cryptographic algorithms