Login / Signup
Common Program Analysis of Two-Party Security Protocols Using SMV.
Yuqing Zhang
Suping Jia
Published in:
APWeb Workshops (2006)
Keyphrases
</>
security protocols
automated design
model checking
security properties
symbolic model checking
security services
cryptographic algorithms
key management
artificial immune algorithm
security mechanisms
authentication protocol
formal verification
cryptographic protocols
secure communication