HIGHLIGHTS
- What: The authors present and discuss these security properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations. The authors propose an idealized model that is key in the described verification process. The work the authors closely follows the approach described. The aim of this work was to identify and analyze the main components of the MW protocol with the aim of building an idealized model and verifying its security properties.
- Who: Adrián Silveira and collaborators from the Universidad de la Repu . . .

If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.