Login / Signup
How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.
Hubert Comon-Lundh
Véronique Cortier
Published in:
STACS (2011)
Keyphrases
</>
communication protocols
formal models
rule based systems
formal model
communication protocol
process model
protocol specification
information systems
communication networks
protocol stack
genetic algorithm
case study
knowledge based systems
business processes