Login / Signup

Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.

Christian ColomboMark Vella
Published in: ICISSP (2020)
Keyphrases
  • cryptographic protocols
  • security properties
  • standard model
  • security protocols
  • optimal solution
  • authentication protocol