Formal Security Analysis. We choose to use ▇▇▇▇▇-logic [38] to perform the verification of the protocol, which is a non-monotonic logic based verification method for cryptographic protocols. It has been successfully used in several protocols to verify the security claims [27][17][12] and is in particular practical as it is close to real implementation. 6.2.1 The protocol specifications
Appears in 3 contracts
Sources: Publication Agreement, Copyright Notice, Research Paper