Sign in

Adversarial Reachability for Program-level Security Analysis.

Soline DucoussoSébastien BardinMarie-Laure Potet
Published in: ESOP (2023)
Keyphrases
  • private key
  • security analysis
  • public key
  • image encryption
  • security requirements
  • smart card
  • high security
  • security model
  • security properties
  • multi agent
  • mutual authentication
  • access control
  • proxy signature scheme