Model based security verification of protocol implementation.
Yulong FuOusmane KonéPublished in: J. Inf. Secur. Appl. (2015)
Keyphrases
- protocol specification
- cryptographic protocols
- communication protocols
- security analysis
- security protocols
- high security
- model checking
- intrusion detection
- key agreement protocol
- security requirements
- security properties
- key exchange protocol
- security issues
- provably secure
- network security
- network layer
- access control
- electronic voting
- cryptographic algorithms
- information security
- denial of service attacks
- formal analysis
- java card
- model checker
- security model
- authentication protocol