Login / Signup
Automated verification of selected equivalences for security protocols.
Bruno Blanchet
Martín Abadi
Cédric Fournet
Published in:
J. Log. Algebraic Methods Program. (2008)
Keyphrases
</>
security protocols
automated verification
model checking
automated reasoning
formal verification
automated design
security services
security properties
key management
rfid tags
real time
security mechanisms
cryptographic protocols
software engineering
bayesian networks
machine learning
data mining