Formal verification of security protocols using Spin.
Shengbo ChenHao FuHuaikou MiaoPublished in: ICIS (2016)
Keyphrases
- formal verification
- security protocols
- model checking
- automated design
- security services
- automated verification
- model checker
- cryptographic algorithms
- bounded model checking
- symbolic model checking
- security properties
- secure communication
- key management
- authentication protocol
- cryptographic protocols
- artificial immune algorithm
- security mechanisms
- temporal logic
- wireless sensor networks
- web services
- rfid tags
- end to end