Login / Signup
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code.
Holger Grandy
Markus Bischof
Kurt Stenzel
Gerhard Schellhorn
Wolfgang Reif
Published in:
FM (2008)
Keyphrases
</>
security protocols
cryptographic protocols
security services
artificial immune algorithm
cryptographic algorithms
automated design
model checking
key management
source code
security mechanisms
authentication protocol
digital libraries
end users
temporal reasoning
security requirements