Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
Michael BackesChristian JacobiPublished in: STACS (2003)
Keyphrases
- security protocols
- cryptographic protocols
- automated design
- artificial immune algorithm
- cryptographic algorithms
- security properties
- model checking
- security services
- key management
- secure communication
- authentication protocol
- rfid tags
- data processing
- response time
- security requirements
- security mechanisms
- lightweight
- information systems