On the secure implementation of security protocols.
Pablo GiambiagiMads DamPublished in: Sci. Comput. Program. (2004)
Keyphrases
- security protocols
- security services
- security properties
- automated design
- key management
- cryptographic algorithms
- security mechanisms
- cryptographic protocols
- authentication protocol
- secure communication
- security requirements
- artificial immune algorithm
- software engineering
- remote attestation
- resource constrained
- rfid tags
- end to end
- low cost