Login / Signup
Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries.
Liudmila Babenko
Ilya Pisarev
Published in:
SIN (2020)
Keyphrases
</>
cryptographic protocols
source code
standard model
security protocols
static analysis
open source
authentication protocol
case study
software systems
insider attacks
low cost
operating system
formal verification
private information retrieval