Login / Signup
The Coinductive Approach to Verifying Cryptographic Protocols.
Jesse Hughes
Martijn Warnier
Published in:
WADT (2002)
Keyphrases
</>
cryptographic protocols
standard model
model checking
security properties
security protocols
authentication protocol
low cost
formal verification
locally decodable codes
database
software engineering
encryption decryption