Login / Signup

A framework for compositional verification of security protocols.

Suzana AndovaCas CremersKristian GjøsteenSjouke MauwStig Fr. MjølsnesSasa Radomirovic
Published in: Inf. Comput. (2008)
Keyphrases
  • security protocols
  • data processing
  • end to end
  • formal model
  • automated design