Modelling and Checking Timed Authentication of Security Protocols.
Gizela JakubowskaWojciech PenczekPublished in: Fundam. Informaticae (2007)
Keyphrases
- security protocols
- authentication protocol
- security services
- security mechanisms
- secure communication
- automated design
- security properties
- security requirements
- access control
- cryptographic algorithms
- artificial immune algorithm
- petri net
- key distribution
- user authentication
- security issues
- key management
- remote attestation
- security systems
- smart card
- authentication scheme
- public key cryptography
- resource constrained
- rfid tags
- operating system
- information security
- biometric authentication
- information systems