Login / Signup
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols.
Véronique Cortier
Stéphanie Delaune
Jannik Dreier
Elise Klein
Published in:
J. Comput. Secur. (2022)
Keyphrases
</>
security protocols
theorem proving
theorem prover
automated design
artificial immune algorithm
cryptographic algorithms
security services
proof search
key management
authentication protocol
security mechanisms
secure communication
security properties
data sources
databases
cryptographic protocols
inference rules
security requirements
lightweight
computer systems
low cost
query processing
data mining