Login / Signup
On Refinement-Closed Security Properties and Nondeterministic Compositions.
Toby C. Murray
Gavin Lowe
Published in:
Electron. Notes Theor. Comput. Sci. (2009)
Keyphrases
</>
security properties
formal model
security analysis
security requirements
security protocols
cryptographic protocols
formal methods
security vulnerabilities
public key
key agreement
information systems
data integration
elliptic curve