Login / Signup
A modular pipeline for enforcement of security properties at runtime.
Rania Taleb
Sylvain Hallé
Raphaël Khoury
Published in:
Ann. des Télécommunications (2023)
Keyphrases
</>
security properties
formal model
security requirements
security analysis
security protocols
access control
cryptographic protocols
key agreement
formal methods
artificial intelligence
sensor networks
fine grained