Login / Signup
Pattern-based abstraction for verifying secrecy in protocols.
Liana Bozga
Yassine Lakhnech
Michaël Périn
Published in:
Int. J. Softw. Tools Technol. Transf. (2006)
Keyphrases
</>
key distribution
security properties
high level
key management
model checking
key exchange
security analysis
fault tolerant
genetic algorithm
mutual authentication
security protocols
case study
secret key
multi party
lightweight
elliptic curve
spread spectrum
reinforcement learning
metadata
information retrieval