Keyphrases
- security properties
- smart card
- security requirements
- security analysis
- formal model
- security protocols
- cryptographic protocols
- security vulnerabilities
- key agreement
- authentication protocol
- databases
- security mechanisms
- security policies
- information security
- secret key
- formal methods
- cost effective
- expert systems
- real time