Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR.
David BaeldeStéphanie DelauneIvan GazeauSteve KremerPublished in: CSF (2017)
Keyphrases
- security protocols
- security properties
- cryptographic protocols
- security services
- authentication protocol
- automated design
- artificial immune algorithm
- security mechanisms
- cryptographic algorithms
- model checking
- privacy preserving
- security issues
- personal information
- formal model
- databases
- key management
- secure communication
- data mining