Integrated Specification and Verification of Security Protocols and Policies.
Simone FrauMohammad Torabi DashtiPublished in: CSF (2011)
Keyphrases
- security protocols
- formal verification
- cryptographic protocols
- automated design
- security properties
- formal methods
- asynchronous circuits
- security services
- model checking
- cryptographic algorithms
- optimal policy
- artificial immune algorithm
- security mechanisms
- information systems
- authentication protocol
- protocol specification
- key management
- data mining techniques
- security requirements
- rfid tags
- formal specification
- smart card
- e government
- digital libraries