Login / Signup
A Generic Methodology for the Modular Verification of Security Protocol Implementations.
Linard Arquint
Malte Schwerhoff
Vaibhav Mehta
Peter Müller
Published in:
CoRR (2022)
Keyphrases
</>
security protocols
cryptographic protocols
security services
artificial immune algorithm
security mechanisms
automated design
data processing
model checking
key management
real time
databases
authentication protocol