Login / Signup
Parallel Bounded Model Checking of Security Protocols.
Miroslaw Kurkowski
Olga Siedlecka-Lamch
Sabina Szymoniak
Henryk Piech
Published in:
PPAM (1) (2013)
Keyphrases
</>
security protocols
bounded model checking
automated design
model checking
formal verification
temporal logic
security services
cryptographic algorithms
security properties
linear temporal logic
artificial immune algorithm
cryptographic protocols
rfid tags
multi agent systems
cost effective
security mechanisms