Back to Results
First PageMeta Content
Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing


Verifying Security Protocols: An ASM Approach. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Lehrstuhl f¨ ur Softwaretechnik und Programmiersprachen Institut f¨
Add to Reading List

Document Date: 2014-12-01 09:19:17


Open Document

File Size: 193,46 KB

Share Result on Facebook

Company

Needham / /

/

Event

FDA Phase / /

IndustryTerm

certain smart card applications / e.g. e-commerce applications / secured using security protocols / application-specific security protocols / distributed applications / security protocols / distributed systems / /

Organization

German Research Foundation / Programmiersprachen Institut f¨ / /

Person

Holger Grandy / Wolfgang Reif / Dominik Haneberg / Gerhard Schellhorn Lehrstuhl / /

Product

Pau98 / /

ProgrammingLanguage

R / /

Technology

Encryption / smart card / private key / security protocols / secret key / public key / application-specific security protocols / SSL / analyzing security protocols / generally secured using security protocols / Verifying Security Protocols / /

SocialTag