Automatic verification of correspondences for security protocols.
Bruno BlanchetPublished in: J. Comput. Secur. (2009)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security properties
- key management
- security services
- security mechanisms
- authentication protocol
- point correspondences
- artificial immune algorithm
- security requirements
- secure communication
- software engineering
- data streams
- response time
- cryptographic protocols