Login / Signup
On Defendability of Security Properties.
Wojciech Jamroga
Matthijs Melissen
Henning Schnoor
Published in:
SR (2014)
Keyphrases
</>
security properties
formal model
security analysis
security requirements
security protocols
cryptographic protocols
security vulnerabilities
formal methods
elliptic curve
key agreement
real time
data mining
information systems
knowledge base