Formal reasoning on authentication in security protocols.
Jaouhar FattahiMohamed MejriRidha GhayoulaEmil PricopPublished in: SMC (2016)
Keyphrases
- security protocols
- authentication protocol
- security services
- security mechanisms
- secure communication
- automated design
- security properties
- key distribution
- security requirements
- cryptographic algorithms
- access control
- key management
- smart card
- artificial immune algorithm
- resource constrained
- user authentication
- security issues
- cryptographic protocols
- authentication scheme
- rfid tags
- biometric authentication
- operating system
- formal methods
- security systems
- cost effective
- data mining
- remote attestation