Login / Signup
Analyzing encryption protocols using formal verification techniques.
Richard A. Kemmerer
Published in:
IEEE J. Sel. Areas Commun. (1989)
Keyphrases
</>
formal verification
cryptographic protocols
model checking
key exchange
security properties
bounded model checking
program slicing
symbolic model checking
model checker
automated verification
temporal logic
authentication protocol
encryption algorithms