Back to Results
First PageMeta Content
Symbol / Mathematics / Multiset / Parity of a permutation


Automated analysis of security protocols with global state Steve Kremer INRIA Nancy - Grand’Est & Loria, France Abstract—Security APIs, key servers and protocols that need to keep the status of transactions, require
Add to Reading List

Document Date: 2014-04-21 13:48:10


Open Document

File Size: 265,69 KB

Share Result on Facebook

City

Rocquencourt / Mödersheim / /

Company

IBM / Needham / channel M / Google / Fres / /

Country

France / /

Currency

pence / /

Event

Product Recall / Product Issues / /

IndustryTerm

protocol analysis tools / stateful security protocols / prototype tool / public key protocol / stateful protocols / comparable tool / optimistic contract signing protocol / constraint solving algorithm / tamarin tool / security device / automated verification tools / security devices / security protocols / /

Organization

//sapic.gforge.inria.fr/ Robert Künnemann Department of Computer Science / /

Person

Robert Künnemann / Ai / Steve Kremer / /

Position

model the communication / model an internal communication / /

Product

Lowe’s attack / x1 / /

ProgrammingLanguage

E / /

ProvinceOrState

Maryland / Mississippi / /

Technology

encryption / public key protocol / constraint solving algorithm / API / RFID protocols / http / analyzing stateful protocols / security protocols / stateful security protocols / GUI / optimistic contract signing protocol / /

SocialTag