Back to Results
First PageMeta Content
Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Protocol / Data / Information / Cryptographic protocols


Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie
Add to Reading List

Document Date: 2013-02-18 06:01:24


Open Document

File Size: 325,92 KB

Share Result on Facebook

Company

Needham / /

/

Facility

Computer Science University College / /

IndustryTerm

protocol analysis tools / backward search / authentication protocol / secure protocols / suitable protocols / valid protocol / agreement protocols / valid protocols / sub-protocols / security protocol / automatic backward search / appropriate protocols / semi-automatic design tool / recursive search / forward search / random candidate protocols / candidate protocols / final protocol / selected protocols / evolutionary search / candidate protocol / incomplete protocol / search space / backward search approach results / security protocols / mutual authentication protocol / /

Movie

A Study in Scarlet / /

Organization

Trusted Third Party / Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department / University College / Cork / /

Person

Arthur Conan Doyle / Clark / Jacob / Simon N. Foley / /

Position

Protocol Composer / designer / writer / protocol designer / Corresponding Author / /

Technology

synthesising security protocols / encryption / authentication protocol / random candidate protocols / candidate protocol / security protocol / mutual authentication protocol / 1 Introduction Security protocols / generating candidate protocols / analysising key agreement protocols / key exchange protocols / incomplete protocol / valid protocol / generated protocols / private key / security protocols / potentially secure protocols / idealised protocol / final protocol / analyzing security protocols / Automatic Security Protocol / candidate protocols / Building security protocols / 5 Protocol / /

SocialTag