Login / Signup

Formal Analysis of V2X Revocation Protocols.

Jorden WhitefieldLiqun ChenFrank KarglAndrew PaverdSteve A. SchneiderHelen TreharneStephan Wesemeyer
Published in: STM (2017)
Keyphrases
  • formal analysis
  • payment protocol
  • key distribution
  • trusted third party
  • access control
  • agent model
  • formal methods
  • key management
  • authentication protocol
  • database
  • machine learning
  • case study
  • security protocols