Observational equivalence and security games: Enhancing the formal analysis of security protocols.
Liujia CaiGuangying CaiSiqi LuGuangsong LiYongjuan WangPublished in: Comput. Secur. (2024)
Keyphrases
- formal analysis
- security protocols
- automated design
- security properties
- security services
- artificial immune algorithm
- key management
- formal methods
- secure communication
- security mechanisms
- ban logic
- authentication protocol
- agent model
- security requirements
- resource constrained
- end to end
- sensor data
- case study
- real time