Security Protocol Verification: Symbolic and Computational Models.
Bruno BlanchetPublished in: POST (2012)
Keyphrases
- computational models
- security protocols
- computational model
- artificial immune algorithm
- cryptographic algorithms
- security services
- language acquisition
- cognitive processes
- computational modeling
- cognitive modelling
- security mechanisms
- authentication protocol
- cognitive modeling
- cognitive architecture
- key management
- rfid tags
- biological systems
- low cost
- user interface
- web services
- symbolic representation
- cognitive architectures
- high security
- sensor networks