ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
On BAN Logics for Industrial Security Protocols
CEEMAS '01 Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems
Efficient Finite-State Analysis for Large Security Protocols
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Prudent Engineering Practice for Cryptographic Protocols
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
This paper deals with the novel evolutionary approach used for the automatic design of security protocols that also employs the novel grammatical generation of protocols according to the design and security requirements. The first part outlines the introduces security protocols Then, in the main part of this paper, we propose the new algorithm based on natural evolution that is utilized for the automated design of secure communication and security protocols. These protocols may be used for authentication, key distribution and/or for providing other security functions and properties.