Sciweavers

GECCO
2006
Springer

Human competitive security protocols synthesis

13 years 8 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication Networks]: Network Protocols; C.2.0 [Computer Communication Networks]: Security and Protection; D.2.2 [Software Engineering]: Design Tools and Techniques Keywords Security Protocols, Belief Logic, Protocol Synthesis, Heuristic Search, Efficiency Requirements, Protocol Refinement
Hao Chen, John A. Clark, Jeremy Jacob
Added 23 Aug 2010
Updated 23 Aug 2010
Type Conference
Year 2006
Where GECCO
Authors Hao Chen, John A. Clark, Jeremy Jacob
Comments (0)