Login / Signup
Formal Verification of a Type Flaw Attack on a Security Protocol Using Object-Z.
Benjamin W. Long
Published in:
ZB (2005)
Keyphrases
</>
formal verification
security protocols
model checking
authentication protocol
automated verification
bounded model checking
model checker
security services
symbolic model checking
artificial immune algorithm
block cipher
security mechanisms
data management
computer systems
security requirements