Deciding Security for Protocols with Recursive Tests.
Mathilde ArnaudVéronique CortierStéphanie DelaunePublished in: CADE (2011)
Keyphrases
- security protocols
- cryptographic protocols
- security services
- security properties
- authentication protocol
- key agreement protocol
- communication protocols
- computer security
- key exchange
- intrusion detection
- key management
- key establishment
- access control
- security policies
- messages exchanged
- security issues
- network security
- information security
- security problems
- high security
- ns simulator
- application level
- security requirements
- statistical databases
- statistical tests
- security threats
- key distribution
- test suite
- secure multiparty computation
- electronic commerce