| Document Date: 2014-12-01 09:19:28 Open Document File Size: 767,55 KBShare Result on Facebook
City Augsburg / / Company Needham / / / Event FDA Phase / / Facility They store / / IndustryTerm cryptographic protocols / e-commerce application / simpler protocols / bad security protocols / application-specific security protocols / abstract protocols / smart card applications / smart cards standard protocols / application specific security protocols / communication network / possible applications / security protocols / generally done using security protocols / / Organization Programmiersprachen Institut f¨ / G.Schellhorn Institut f¨ / ¨r Informatik Institut / / Person Wolfgang Reif / Dominik Haneberg / Gerhard Schellhorn Lehrstuhl / Holger Grandy / / Position rather simple model of communication / formal ASM model / an appropriate verification strategy / / Product Bel01 / Pau98 / / ProgrammingLanguage Java / / Technology Encryption / public key / application-specific security protocols / application specific security protocols / Java / using security protocols / bad security protocols / Shoup-Rubin protocol / Smart Card / private key / security protocols / abstract protocols / secret key / SSL / analyzing security protocols / 1 protocols / / URL http /
SocialTag |