Back to Results
First PageMeta Content
Information / Dolev-Yao model / Public-key cryptography / Communications protocol / Needham–Schroeder protocol / Transmission Control Protocol / Smart card / Email / Cryptographic protocols / Cryptography / Data


¨t Augsburg Universita Verifying Smart Card Applications: An ASM Approach. D.Haneberg, H.Grandy, W.Reif, G.Schellhorn
Add to Reading List

Document Date: 2014-12-01 09:19:28


Open Document

File Size: 767,55 KB

Share Result on Facebook

City

Augsburg / /

Company

Needham / /

/

Event

FDA Phase / /

Facility

They store / /

IndustryTerm

cryptographic protocols / e-commerce application / simpler protocols / bad security protocols / application-specific security protocols / abstract protocols / smart card applications / smart cards standard protocols / application specific security protocols / communication network / possible applications / security protocols / generally done using security protocols / /

Organization

Programmiersprachen Institut f¨ / G.Schellhorn Institut f¨ / ¨r Informatik Institut / /

Person

Wolfgang Reif / Dominik Haneberg / Gerhard Schellhorn Lehrstuhl / Holger Grandy / /

Position

rather simple model of communication / formal ASM model / an appropriate verification strategy / /

Product

Bel01 / Pau98 / /

ProgrammingLanguage

Java / /

Technology

Encryption / public key / application-specific security protocols / application specific security protocols / Java / using security protocols / bad security protocols / Shoup-Rubin protocol / Smart Card / private key / security protocols / abstract protocols / secret key / SSL / analyzing security protocols / 1 protocols / /

URL

http /

SocialTag