Practical and Scalable Security Verification of Secure Architectures.
Jakub SzeferTianwei ZhangRuby B. LeePublished in: CoRR (2018)
Keyphrases
- integrity verification
- cryptographic protocols
- high security
- security requirements
- security issues
- key management
- security level
- security mechanisms
- security analysis
- security properties
- security measures
- security management
- security protocols
- access control
- data encryption
- authentication protocol
- identity management
- data security
- sensitive data
- electronic voting
- security architecture
- security services
- high assurance
- stream cipher
- encryption scheme
- security patterns
- authentication scheme
- key agreement protocol
- image encryption
- security model
- key exchange
- digital signature scheme
- information security
- user authentication
- secure multiparty computation
- authentication mechanism
- public key encryption
- key exchange protocol
- key management scheme
- secure communication
- java card
- key distribution
- formal analysis
- smart card
- key agreement
- key establishment
- scalar product
- model checking
- cloud computing