Verifying security protocols with Brutus.
Edmund M. ClarkeSomesh JhaWilfredo R. MarreroPublished in: ACM Trans. Softw. Eng. Methodol. (2000)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security services
- security properties
- key management
- model checking
- artificial immune algorithm
- cryptographic protocols
- security mechanisms
- authentication protocol
- wireless sensor networks
- security requirements
- ad hoc networks
- secure communication
- low cost
- web services