Overview Introduction & Motivation Composition Experimental results Conclusion
Automated Composition of Security Protocols
Genge B´ ela1, Iosif Ignat2 and Haller Piroska1
1“Petru Maior” University of Tˆ
argu Mure¸ s, Romania {bgenge, phaller}@engineering.upm.ro
2Technical University of Cluj Napoca, Romania
Iosif.Ignat@cs.utcluj.ro August 28, 2009
1 / 33