Login / Signup

Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols.

Ajith RamanathanJohn C. MitchellAndre ScedrovVanessa Teague
Published in: FoSSaCS (2004)
Keyphrases
  • security analysis
  • network protocols
  • public key
  • smart card
  • security requirements
  • user authentication
  • wireless mesh networks
  • real time
  • data streams
  • data analysis
  • data management
  • encryption scheme