Bounding Messages for Free in Security Protocols.
Myrto ArapinisMarie DuflotPublished in: FSTTCS (2007)
Keyphrases
- security protocols
- automated design
- security properties
- cryptographic algorithms
- security services
- key management
- artificial immune algorithm
- security mechanisms
- secure communication
- authentication protocol
- upper bound
- cryptographic protocols
- information systems
- artificial intelligence
- security requirements
- data processing
- database systems
- web services