On backward-style verification for timed anonymity of security protocols.
Yoshinobu KawabeNobuhiro ItoPublished in: GCCE (2016)
Keyphrases
- security protocols
- security properties
- cryptographic protocols
- automated design
- cryptographic algorithms
- security services
- petri net
- security mechanisms
- formal methods
- model checking
- authentication protocol
- key management
- colored petri nets
- artificial immune algorithm
- high security
- secure communication
- formal verification
- security analysis
- virtual machine
- data mining techniques