Login / Signup
Modular verification of security protocol code by typing.
Karthikeyan Bhargavan
Cédric Fournet
Andrew D. Gordon
Published in:
POPL (2010)
Keyphrases
</>
security protocols
cryptographic protocols
artificial immune algorithm
automated design
authentication protocol
source code
security services
cryptographic algorithms
key management
model checking
security mechanisms
real time
search engine
software engineering
power consumption