EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security.
Ran CanettiAlley StoughtonMayank VariaPublished in: CSF (2019)
Keyphrases
- security requirements
- information security
- access control
- information systems
- cyber security
- security policies
- computer security
- security problems
- security systems
- security issues
- network security
- intrusion detection
- statistical databases
- data security
- formal proofs
- data mining
- security protocols
- theorem proving
- security level
- cryptographic protocols
- security measures
- information assurance