Login / Signup
Constraint Abstraction in Verification of Security Protocols.
Ti Zhou
Zhoujun Li
Mengjun Li
Huowang Chen
Published in:
FAW (2008)
Keyphrases
</>
security protocols
cryptographic protocols
automated design
security properties
cryptographic algorithms
security services
security mechanisms
artificial immune algorithm
model checking
key management
real time
secure communication
authentication protocol
formal verification
formal methods
web services
databases