Formal verification of security protocol implementations: a survey.
Matteo AvalleAlfredo PirontiRiccardo SistoPublished in: Formal Aspects Comput. (2014)
Keyphrases
- formal verification
- security protocols
- model checking
- security services
- automated design
- model checker
- artificial immune algorithm
- cryptographic algorithms
- bounded model checking
- authentication protocol
- key management
- automated verification
- symbolic model checking
- security mechanisms
- temporal logic
- program slicing
- security requirements
- rfid tags
- response time