Login / Signup
Verifying Security Protocols: An ASM Approach.
Dominik Haneberg
Holger Grandy
Wolfgang Reif
Gerhard Schellhorn
Published in:
Abstract State Machines (2005)
Keyphrases
</>
security protocols
active shape model
automated design
security services
security properties
cryptographic algorithms
key management
secure communication
artificial immune algorithm
model checking
security mechanisms
authentication protocol