Sign in

Runtime verification of cryptographic protocols.

Andreas BauerJan Jürjens
Published in: Comput. Secur. (2010)
Keyphrases
  • cryptographic protocols
  • standard model
  • security properties
  • security protocols
  • authentication protocol
  • encryption decryption
  • response time