A Formal Analysis of Complex Type Flaw Attacks on Security Protocols.
Han GaoChiara BodeiPierpaolo DeganoPublished in: AMAST (2008)
Keyphrases
- security protocols
- formal analysis
- authentication protocol
- ban logic
- security properties
- automated design
- cryptographic algorithms
- key management
- formal methods
- security mechanisms
- security services
- secure communication
- cryptographic protocols
- security requirements
- resource constrained
- digital libraries
- artificial immune algorithm
- real time