Login / Signup
Analysing Time Dependent Security Properties in CSP Using PVS.
Neil Evans
Steve A. Schneider
Published in:
ESORICS (2000)
Keyphrases
</>
security properties
constraint satisfaction problems
formal model
security requirements
security analysis
security protocols
cryptographic protocols
formal verification
security vulnerabilities
formal methods
key agreement
travel time
elliptic curve
public key
information systems
data mining
databases
real time