Verification of randomized security protocols.
Rohit ChadhaA. Prasad SistlaMahesh ViswanathanPublished in: LICS (2017)
Keyphrases
- security protocols
- cryptographic protocols
- automated design
- cryptographic algorithms
- security properties
- security services
- key management
- model checking
- authentication protocol
- artificial immune algorithm
- secure communication
- security mechanisms
- formal methods
- security requirements
- formal verification
- real time
- artificial intelligence