Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach.
Guoqiang ShuDavid LeePublished in: ICDCS (2007)
Keyphrases
- security properties
- machine learning
- cryptographic protocols
- security protocols
- security analysis
- security requirements
- formal model
- diffie hellman
- key agreement
- security vulnerabilities
- artificial intelligence
- knowledge acquisition
- authentication protocol
- information security
- smart card
- routing protocol
- information systems
- mutual authentication