Login / Signup
Security Protocols Verification in Abductive Logic Programming: A Case Study.
Marco Alberti
Federico Chesani
Marco Gavanelli
Evelina Lamma
Paola Mello
Paolo Torroni
Published in:
ESAW (2005)
Keyphrases
</>
security protocols
abductive logic programming
cryptographic protocols
logic programs
automated design
security mechanisms
key management
proof procedure
model checking
case study
logic programming
rfid tags
security requirements
real time