Automated verification of a key management architecture for hierarchical group protocols.
Mohamed Salah BouassidaNajah ChridiIsabelle ChrismentOlivier FestorLaurent VigneronPublished in: Ann. des Télécommunications (2007)
Keyphrases
- key management
- automated verification
- key distribution
- security protocols
- key establishment
- security services
- wireless sensor networks
- ad hoc networks
- model checking
- resource constrained
- group communication
- digital signature
- key management scheme
- provably secure
- real time
- formal verification
- identity based cryptography
- elliptic curve
- automated reasoning
- secret key
- software architecture
- security properties
- secure communication
- wireless networks
- access control
- artificial intelligence