Login / Signup
Automated Verification of Selected Equivalences for Security Protocols.
Bruno Blanchet
Martín Abadi
Cédric Fournet
Published in:
LICS (2005)
Keyphrases
</>
security protocols
automated verification
model checking
automated design
formal verification
automated reasoning
security properties
security mechanisms
security services
artificial immune algorithm
key management
real time
sensor data
constraint satisfaction
embedded systems