Login / Signup
Using Interpolation for the Verification of Security Protocols.
Marco Rocchetto
Luca Viganò
Marco Volpe
Giacomo Dalle Vedove
Published in:
STM (2013)
Keyphrases
</>
security protocols
cryptographic protocols
automated design
artificial immune algorithm
security properties
security services
security mechanisms
key management
cryptographic algorithms
model checking
authentication protocol
secure communication
formal verification
data mining
formal methods
rfid tags
low cost