Login / Signup
The concept of layered proving trees and its application to the automation of security protocol verification.
Reiner Dojen
Tom Coffey
Published in:
ACM Trans. Inf. Syst. Secur. (2005)
Keyphrases
</>
security protocols
artificial immune algorithm
decision trees
cryptographic protocols
security services
automated design
end users
cryptographic algorithms