Login / Signup

Modeling for Security Verification of a Cryptographic Protocol with MAC Payload.

Huanbao WangYousheng ZhangYuan Li
Published in: ICIC (2) (2005)
Keyphrases
  • cryptographic protocols
  • security properties
  • security protocols
  • authentication protocol
  • standard model
  • formal verification
  • high security
  • real time
  • access control
  • intrusion detection
  • insider attacks