Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols.
Véronique CortierStéphanie DelauneJannik DreierPublished in: ESORICS (2) (2020)
Keyphrases
- security protocols
- theorem proving
- theorem prover
- automated design
- security properties
- cryptographic algorithms
- artificial immune algorithm
- proof search
- security services
- data sources
- authentication protocol
- security mechanisms
- key management
- secure communication
- first order logic
- cryptographic protocols
- security requirements
- rfid tags
- inference rules
- wireless networks
- databases