Login / Signup
A Tool for Lazy Verification of Security Protocols.
Yannick Chevalier
Laurent Vigneron
Published in:
ASE (2001)
Keyphrases
</>
information security
security protocols
intrusion detection
automated design
cryptographic protocols
security services
artificial immune algorithm
model checking
security properties
key management
end to end
secure communication
cryptographic algorithms