Login / Signup
Modelling Attacker with Deciding Security Properties by Induction and Deduction.
Yoney Kirsal Ever
Agozie Eneh
Orhan Gemikonakli
Leonardo Mostarda
Published in:
AINA Workshops (2013)
Keyphrases
</>
security properties
formal model
security requirements
security analysis
security protocols
cryptographic protocols
security vulnerabilities
formal methods
machine learning
low cost
peer to peer
smart card
elliptic curve
key agreement