Login / Signup
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System.
Joshua Gancher
Sydney Gibson
Pratap Singh
Samvid Dharanikota
Bryan Parno
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
information flow
security protocols
flow analysis
automated design
social networks
cryptographic protocols
communication networks
supply chain
information security
information flows
artificial immune algorithm
model checking
security requirements
security properties
decision making
key management