Sign in

Monitoring of Security Properties Using BeepBeep.

Mohamed Recem BoussahaRaphaël KhourySylvain Hallé
Published in: FPS (2017)
Keyphrases
  • security properties
  • formal model
  • security requirements
  • security analysis
  • security protocols
  • real time
  • security vulnerabilities
  • formal methods
  • image compression
  • model checking
  • smart card