Login / Signup

DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice.

Vincent ChevalSteve KremerItsaka Rakotonirina
Published in: CoRR (2022)
Keyphrases
  • security protocols
  • security properties
  • artificial immune algorithm
  • automated design
  • cryptographic algorithms
  • security services
  • key management
  • response time
  • software development
  • data processing