Back to Results
First PageMeta Content
Mathematics / Formal methods / Temporal logic / Model checking / Linear temporal logic / Formal verification / Runtime verification / Büchi automaton / Model theory / Theoretical computer science / Applied mathematics / Logic in computer science


Security Protocols, Properties, and their Monitoring Andreas Bauer Jan Jürjens Computer Sciences Laboratory
Add to Reading List

Document Date: 2008-05-27 22:19:01


Open Document

File Size: 246,46 KB

Share Result on Facebook

City

Leipzig / /

Company

Prentice-Hall / MIT Press / Needham / P. Avgustinov A. S. / /

Country

Germany / United States / /

Currency

USD / /

/

Facility

Computing The Open University / /

IndustryTerm

security-critical applications / concrete reputation-systems / cryptographic protocols / temporal logic verification tools / http /

Movie

D. V / /

Organization

Open University / Institut für Informatik / MIT / Technische Universität München / U.S. Securities and Exchange Commission / Australian National University Department / /

Person

Andreas Bauer Jan Jürjens / /

Position

Dolev-Yao adversary model for security analysis / designer / General / /

ProgrammingLanguage

Java / J / /

ProvinceOrState

Manitoba / Ontario / /

PublishedMedium

IEEE Transactions on Software Engineering / Lecture Notes in Computer Science / /

Technology

Cryptography / crypto algorithms / computer protocols / Terms Security Keywords Security protocols / RUNTIME SECURITY PROPERTIES OF THE SSL-PROTOCOL / Java / finite state machine / SSL Protocol / particular protocol / cryptographic protocol / Internet security protocol / Security Protocols / SSL / Operating Systems / monitoring security protocols / cryptographic algorithms / cryptographic algorithm / /

URL

http /

SocialTag