Back to Results
First PageMeta Content



International Journal of Security and Its Applications Vol.8, No), pphttp://dx.doi.orgijsiaHow to Formally Model Features of Network Security Protocols∗
Add to Reading List

Document Date: 2018-03-08 05:11:17


Open Document

File Size: 353,48 KB

Share Result on Facebook

Company

Needham / EURASIP Journal / Embedded Vehicular Security Systems / Embedded Systems / /

Country

Korea / /

Currency

pence / /

/

Event

FDA Phase / /

IndustryTerm

cryptographic protocols / automatic tools / vehicular security systems / Web Information Engineering Hankyong National University Anseong-si / security protocol / public key protocols / automated tools / Information technology / well-formed protocols / public key authentification protocol / software security module / public key authentication protocol / security protocols / verification security protocols / security technologies / insecure networks / /

Organization

Korea government / U.S. Securities and Exchange Commission / National Research Foundation / IEEE Computer Society / /

Person

Marko Wolf / Bob / Alice / D. Schroeder / Akira Otsuka / Bruno Blanchet / Thomas Wollinger / /

/

Position

author / Access Control Model for Secure Enterprise Network Environment / /

Product

An1 / Figure / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

encryption / security technologies / public key authentification protocol / 1 Introduction Network security protocols / cryptography / Public-Key Protocol / security protocol / verification security protocols / public key / Key Distribution Protocol / Information technology / public key authentication protocol / following security protocol / 2.2 Protocol / well-formed protocols / security protocols / secret key / public key protocols / Using Encryption / verifying security protocols / implementing security protocols / network protocols / /

URL

http /

SocialTag