Login / Signup
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version).
Michele Peroli
Luca Viganò
Matteo Zavatteri
Published in:
CoRR (2014)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
artificial immune algorithm
security properties
collaborative learning
security mechanisms
secure communication
key management
authentication protocol