Login / Signup
Verifying security protocols with PVS: widening the rank function approach.
Neil Evans
Steve A. Schneider
Published in:
J. Log. Algebraic Methods Program. (2005)
Keyphrases
</>
security protocols
automated design
artificial immune algorithm
security properties
security services
digital libraries
wireless sensor networks
data warehouse
authentication protocol
formal verification
secure communication