Abstract
Security protocols play an important role in modern communications. However, security protocol development is a delicate task, and experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimization techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesize public key protocols and hybrid protocols.
Original language | English |
---|---|
Title of host publication | CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS |
Place of Publication | NEW YORK |
Publisher | IEEE |
Pages | 2181-2188 |
Number of pages | 8 |
ISBN (Print) | 0-7803-7804-0 |
Publication status | Published - 2003 |
Event | Congress on Evolutionary Computation (CEC) - Canberra Duration: 8 Dec 2003 → 12 Dec 2003 |
Conference
Conference | Congress on Evolutionary Computation (CEC) |
---|---|
City | Canberra |
Period | 8/12/03 → 12/12/03 |