Login / Signup
Using a PVS Embedding of CSP to Verify Authentication Protocols.
Bruno Dutertre
Steve A. Schneider
Published in:
TPHOLs (1997)
Keyphrases
</>
authentication protocol
constraint satisfaction problems
smart card
security analysis
lightweight
security protocols
formal verification
rfid tags
hash functions
secret key
public key
ban logic
theorem proving
data sets
information sharing
cryptographic protocols
rfid systems
query processing