Login / Signup
Using Formal Verification Techniques to Analyze Encryption Protocols.
Richard A. Kemmerer
Published in:
IEEE Symposium on Security and Privacy (1987)
Keyphrases
</>
formal verification
cryptographic protocols
model checking
key exchange
bounded model checking
model checker
automated verification
security properties
temporal logic
symbolic model checking
program slicing
artificial intelligence
expert systems
wireless sensor networks