Login / Signup
A framework for compositional verification of security protocols.
Suzana Andova
Cas Cremers
Kristian Gjøsteen
Sjouke Mauw
Stig Fr. Mjølsnes
Sasa Radomirovic
Published in:
Inf. Comput. (2008)
Keyphrases
</>
security protocols
data processing
end to end
formal model
automated design