Login / Signup
Detecting Failed Attacks on Human-Interactive Security Protocols.
A. W. Roscoe
Published in:
Security Protocols Workshop (2016)
Keyphrases
</>
security protocols
cryptographic algorithms
automated design
security properties
security services
security mechanisms
key management
secure communication
artificial immune algorithm
cryptographic protocols
real time
rfid tags
information systems
smart card
security requirements