Login / Signup
Runtime verification of cryptographic protocols.
Andreas Bauer
Jan Jürjens
Published in:
Comput. Secur. (2010)
Keyphrases
</>
cryptographic protocols
standard model
security properties
security protocols
authentication protocol
encryption decryption
response time