Verifying Security Protocols: An Application of CSP.
Steve A. SchneiderRob DelicataPublished in: 25 Years Communicating Sequential Processes (2004)
Keyphrases
- security protocols
- constraint satisfaction problems
- cryptographic algorithms
- automated design
- security services
- security properties
- artificial immune algorithm
- key management
- arc consistency
- model checking
- security mechanisms
- secure communication
- authentication protocol
- cryptographic protocols
- rfid tags
- search space
- security requirements
- np hard