Login / Signup
Modeling for Security Verification of a Cryptographic Protocol with MAC Payload.
Huanbao Wang
Yousheng Zhang
Yuan Li
Published in:
ICIC (2) (2005)
Keyphrases
</>
cryptographic protocols
security properties
security protocols
authentication protocol
standard model
formal verification
high security
real time
access control
intrusion detection
insider attacks