Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
Cas J. F. CremersPublished in: CCS (2008)
Keyphrases
- security protocols
- cryptographic protocols
- automated design
- cryptographic algorithms
- secure communication
- key management
- security services
- model checking
- security properties
- authentication protocol
- artificial immune algorithm
- real time
- security mechanisms
- security requirements
- formal verification
- network traffic
- evolutionary design
- data processing
- data mining
- databases