Security Proofs for Protocols Involving Humans.
Kenneth RadkeColin BoydPublished in: Comput. J. (2017)
Keyphrases
- security protocols
- key agreement protocol
- communication protocols
- authentication protocol
- security properties
- secure multiparty computation
- cryptographic protocols
- access control
- key distribution
- security services
- intrusion detection
- application level
- key establishment
- network security
- information security
- privacy preserving
- security requirements
- network management
- security issues
- security policies
- human subjects
- computer programs
- statistical databases
- key exchange
- messages exchanged
- contractual obligations
- security mechanisms
- human operators
- human users
- theorem proving
- theorem prover
- smart card