Lazy Self-composition for Security Verification.
Weikun YangYakir VizelPramod SubramanyanAarti GuptaSharad MalikPublished in: CAV (2) (2018)
Keyphrases
- high security
- java card
- integrity verification
- cryptographic protocols
- intrusion detection
- security systems
- security issues
- model checking
- information security
- security analysis
- neural network
- information assurance
- face verification
- security policies
- access control
- key management
- computer security
- formal verification
- image encryption
- decision trees
- formal methods
- security mechanisms
- data security
- network security
- verification method
- data mining
- high assurance
- database