SAT and SMT-Based Verification of Security Protocols Including Time Aspects.
Sabina SzymoniakOlga Siedlecka-LamchAgnieszka M. ZbrzeznyAndrzej ZbrzeznyMiroslaw KurkowskiPublished in: Sensors (2021)
Keyphrases
- security protocols
- cryptographic protocols
- modulo theories
- automated design
- cryptographic algorithms
- artificial immune algorithm
- security services
- authentication protocol
- model checking
- satisfiability problem
- key management
- security properties
- statistical machine translation
- sat solvers
- information systems
- security mechanisms
- security requirements
- rfid tags
- answer set programming
- machine translation
- query processing
- database systems