Back to Results
First PageMeta Content
Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security


2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark
Add to Reading List

Document Date: 2014-04-30 03:10:08


Open Document

File Size: 384,14 KB

Share Result on Facebook

City

Santiago / /

Company

Assume B / Needham / T. Nipkow L. C. / /

Currency

USD / /

/

Facility

Florian Kamm¨uller Middlesex University / Insider Threat Analysis Christian W. Probst Technical University / /

IndustryTerm

Internet Security Protocols / network communication protocols / access_server / Internet protocol IP / cryptographic protocols / multi-agent systems / bank / multi agent systems / large networks / recent successful tools / communication network / http /

NaturalFeature

Data streams / /

Organization

Technical University of Denmark / uller Middlesex University London / KI β.3 I / European Union / /

Person

Insider / D. Schroeder / Gavin Lowe / Florian Kammüller / Christian W. Probst / Florian Kamm¨uller / Nick Perry / /

Position

author / announcer / actor / analysis model for the system model based invalidation approach / member of a group / Proof Assistant / /

ProvinceOrState

Pennsylvania / /

PublishedMedium

Communications of the ACM / Lecture Notes in Computer Science / /

Technology

encryption / NSPK protocol / network communication protocols / cryptography / Public Key protocol / needham-schroeder publickey protocol / public key / IP / HTTP / needham-schroeder publickey authentication protocol / private key / security protocols / simulation / /

URL

http /

SocialTag