Login / Signup
A derivation system and compositional logic for security protocols.
Anupam Datta
Ante Derek
John C. Mitchell
Dusko Pavlovic
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
key management
security properties
modal logic
secure communication
authentication protocol
security mechanisms
artificial immune algorithm
database systems
data mining
e government
wireless networks
security requirements