On the automated implementation of modal logics used to verify security protocols.
Tom CoffeyReiner DojenTomas FlanaganPublished in: ISICT (2003)
Keyphrases
- modal logic
- security protocols
- automated design
- inference rules
- nonmonotonic logics
- temporal logic
- decision procedures
- epistemic logic
- artificial immune algorithm
- cryptographic algorithms
- security services
- default logic
- security properties
- engineering design
- evolutionary design
- end to end
- intrusion detection
- real time