Login / Signup
DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice.
Vincent Cheval
Steve Kremer
Itsaka Rakotonirina
Published in:
CoRR (2022)
Keyphrases
</>
security protocols
security properties
artificial immune algorithm
automated design
cryptographic algorithms
security services
key management
response time
software development
data processing