![Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing](https://www.pdfsearch.io/img/65cc0b305a35065ce716adc488a75f29.jpg)
| Document Date: 2014-12-01 09:19:17 Open Document File Size: 193,46 KBShare Result on Facebook
Company Needham / / / Event FDA Phase / / IndustryTerm certain smart card applications / e.g. e-commerce applications / secured using security protocols / application-specific security protocols / distributed applications / security protocols / distributed systems / / Organization German Research Foundation / Programmiersprachen Institut f¨ / / Person Holger Grandy / Wolfgang Reif / Dominik Haneberg / Gerhard Schellhorn Lehrstuhl / / Product Pau98 / / ProgrammingLanguage R / / Technology Encryption / smart card / private key / security protocols / secret key / public key / application-specific security protocols / SSL / analyzing security protocols / generally secured using security protocols / Verifying Security Protocols / /
SocialTag |