Keyphrases
- formal analysis
- higher efficiency
- ban logic
- authentication protocol
- security requirements
- digital signature scheme
- security analysis
- formal methods
- authentication scheme
- security model
- elliptic curve
- security issues
- agent model
- public key
- case study
- security protocols
- network security
- information security
- intrusion detection
- access control
- relational databases
- diffie hellman
- provably secure
- expert systems
- natural language