Login / Signup
Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata.
Sigrid Gürgens
Peter Ochsenschläger
Carsten Rudolph
Published in:
DEXA Workshops (2002)
Keyphrases
</>
security analysis
cryptographic protocols
authentication protocol
security properties
public key
smart card
security requirements
formal verification
standard model
encryption scheme
access control
access control policies
security protocols
user authentication
fine grained
conflict resolution