Login / Signup
Automatic Verification for Later-Correspondence of Security Protocols.
Xiaofei Xie
Xiaohong Li
Yang Liu
Li Li
Ruitao Feng
Zhiyong Feng
Published in:
SOFL+MSVL (2014)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security services
key management
secure communication
artificial immune algorithm
security properties
authentication protocol
security mechanisms
real time
databases
data processing
security requirements
cryptographic protocols