Login / Signup
Verifying Implementations of Security Protocols by Refinement.
Nadia Polikarpova
Michal Moskal
Published in:
VSTTE (2012)
Keyphrases
</>
security protocols
automated design
security services
security properties
cryptographic algorithms
artificial immune algorithm
key management
model checking
secure communication
security mechanisms
authentication protocol
cryptographic protocols
digital libraries
rfid tags