An approach to the formal verification of the three-principal security protocols.
Yuqing ZhangXiuying LiuDengguo FengPublished in: Security and Management (2005)
Keyphrases
- formal verification
- security protocols
- model checking
- automated design
- cryptographic algorithms
- bounded model checking
- security services
- model checker
- security properties
- automated verification
- key management
- secure communication
- artificial immune algorithm
- security mechanisms
- cryptographic protocols
- symbolic model checking
- authentication protocol
- low cost
- data mining