bimam bref - Academia.edu (original) (raw)

bimam bref

Jennifer Seberry related author profile picture

Elvinia Riccobene related author profile picture

Elvinia Riccobene

Università degli Studi di Milano - State University of Milan (Italy)

Tarek El-Sakka related author profile picture

Chris Mitchell related author profile picture

Mohamed amine Mejri related author profile picture

Joshua Guttman related author profile picture

Fabio Massacci related author profile picture

Lawrence Paulson related author profile picture

Alec Yasinsac related author profile picture

Jeannette Wing related author profile picture

Uploads

Papers by bimam bref

Research paper thumbnail of FORMAL VERIFICATION TECHNIQUES FOR COMPUTER COMMUNICATION SECURITY PROTOCOLS

Rapid development of networks and communications makes security a more and more crucial problem. ... more Rapid development of networks and communications makes security a more and more crucial problem. To provide security for diierent systems, many communication security protocols are proposed. Such protocols must be proved correct before they can be used in practice. Formal veriication techniques are promising methods to verify protocols and have been receiving a lot of attention recently. In this paper, we survey several security protocols and formal veriication techniques to verify the protocols.

Research paper thumbnail of FORMAL VERIFICATION TECHNIQUES FOR COMPUTER COMMUNICATION SECURITY PROTOCOLS

Rapid development of networks and communications makes security a more and more crucial problem. ... more Rapid development of networks and communications makes security a more and more crucial problem. To provide security for diierent systems, many communication security protocols are proposed. Such protocols must be proved correct before they can be used in practice. Formal veriication techniques are promising methods to verify protocols and have been receiving a lot of attention recently. In this paper, we survey several security protocols and formal veriication techniques to verify the protocols.

Log In