Login / Signup
Demonstrating the Necessity of Model Generation in Security Protocol Verification.
Mariapia Raimondo
Stefano Marrone
Simona Bernardi
Angelo Palladino
Published in:
ETFA (2023)
Keyphrases
</>
security protocols
cryptographic protocols
security services
automated design
cryptographic algorithms
artificial immune algorithm
model checking
security mechanisms
key management
authentication protocol
real time
end users
security requirements
databases
query processing
low cost