Login / Signup
Challenges in the Automated Verification of Security Protocols.
Hubert Comon-Lundh
Published in:
IJCAR (2008)
Keyphrases
</>
security protocols
automated verification
model checking
automated design
automated reasoning
formal verification
security properties
artificial immune algorithm
security services
key management
security requirements
wireless sensor networks
security mechanisms
information systems
low cost
wireless networks