• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Sound Verification of Security Protocols: From Design to Interoperable Implementations.

Linard ArquintFelix A. WolfJoseph LallemandRalf SasseChristoph SprengerSven N. WiesnerDavid A. BasinPeter Müller
Published in: SP (2023)
Keyphrases
  • automated design
  • security protocols
  • artificial immune algorithm
  • metadata
  • engineering design
  • information systems
  • web services
  • query processing
  • data management
  • design process
  • wireless networks