Formal verification of security protocols
When you try to verify security protocols you have to do a lot of different steps like formalizing a simpler version based on a extremely complex real protocol using some extended Dolev Yao model. Afterwards you have to look … Continue reading Formal verification of security protocols