Back to Results
First PageMeta Content
Information / Public-key cryptography / Electronic commerce / Secure communication / PKCS / Smart card / Communications protocol / Secure Electronic Transaction / Deniable authentication / Cryptography / Cryptographic protocols / Data


Making Sense of Specifications: the Formalization of SET (Extended Abstract) Giampaolo Bella1 , Fabio Massacci2,3 , Lawrence C. Paulson1 , and Piero Tramontano3 1
Add to Reading List

Document Date: 2004-10-19 21:06:10


Open Document

File Size: 98,00 KB

Share Result on Facebook

Company

Mastercard / American Express / IEEE Computer Society Press / Needham / RSA Laboratories / RCA / Microsoft / Piero Tramontano3 1 3 1 Computer Laboratory / /

/

Event

FDA Phase / /

Facility

University of Cambridge Pembroke Street / /

IndustryTerm

cryptographic protocols / technology dependent features / electronic commerce protocols / cryptographic algorithms / software corporations / cryptography algorithms / realistic protocols / large networks / internet protocol / Contemporary theorem-proving technology / particular algorithms / large commercial protocols / real-world cryptographic algorithms / Electronic payment systems / compliant protocol / authentication protocols / security protocols / electronic commerce / /

Organization

University of Cambridge Pembroke Street / Certification Authority / /

Person

Specification / M. Schroeder / /

Position

Spy / General / Programmer / /

Product

C / MD4 / VISA / /

PublishedMedium

the Programmer Guide / Communications of the ACM / IEEE Transactions on Software Engineering / Lecture Notes in Computer Science / /

Technology

encryption / cryptography / particular algorithms / SET compliant protocol / public key / internet protocol / authentication protocols / working protocol / SET protocol / electronic commerce protocols / signature symmetric key encryption / private key / security protocols / Contemporary theorem-proving technology / digital signature / specific cryptographic algorithms / same algorithm / Using encryption / SSL / 2 The SET Protocol The SET protocol / cryptography algorithms / key-distribution protocols / /

URL

http /

SocialTag