A Z Based Approach to Verifying Security Protocols.
Benjamin W. LongColin J. FidgeAntonio CeronePublished in: ICFEM (2003)
Keyphrases
- security protocols
- automated design
- security services
- security properties
- key management
- security mechanisms
- artificial immune algorithm
- authentication protocol
- cryptographic algorithms
- security requirements
- real time
- model checking
- computer systems
- cryptographic protocols
- software engineering
- web services
- secure communication
- artificial intelligence