G2C: cryptographic protocols from goal-driven specifications
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Hi-index | 0.00 |
This paper proposes a novel approach to automated design of security protocols uing artificial immune algorithm based on cord calculs. Designing security protocol is notoriously difficult and error- prone. Artificial immune algorithm is a powerfully intelligent algorithm. The cord calculus is applied to the artificial immune algorithm to instruct the search and compose of security protocols. Automated design of security protocols using artificial immune algorithm can alleviate people's burden of manually design security protocols and get more security and reliable protocols.