Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols.
Véronique CortierStéphanie DelauneJannik DreierElise KleinPublished in: J. Comput. Secur. (2022)
Keyphrases
- security protocols
- theorem proving
- theorem prover
- automated design
- artificial immune algorithm
- cryptographic algorithms
- security services
- proof search
- key management
- authentication protocol
- security mechanisms
- secure communication
- security properties
- data sources
- databases
- cryptographic protocols
- inference rules
- security requirements
- lightweight
- computer systems
- low cost
- query processing
- data mining