Login / Signup
Security Analysis using Flow Logics.
Chiara Bodei
Pierpaolo Degano
Flemming Nielson
Hanne Riis Nielson
Published in:
Bull. EATCS (2000)
Keyphrases
</>
security analysis
smart card
public key
security requirements
security model
high security
security properties
image encryption
encryption scheme
authentication protocol
encryption algorithm
mutual authentication
authentication scheme
information flow
databases
user authentication
third party
cost effective