SAT-Based Verification of Security Protocols Via Translation to Networks of Automata.
Miroslaw KurkowskiWojciech PenczekAndrzej ZbrzeznyPublished in: MoChArt (2006)
Keyphrases
- security protocols
- cryptographic protocols
- automated design
- bounded model checking
- artificial immune algorithm
- cryptographic algorithms
- security properties
- authentication protocol
- formal verification
- security mechanisms
- answer set programming
- computer networks
- model checking
- real time
- security requirements
- security services
- secure communication
- smart card
- distributed systems
- digital libraries