Keyphrases
Security Protocols
95%
Automatic Generation
36%
Security Analysis
35%
Payment Protocol
23%
Security Properties
22%
Security Verification
20%
Formal Modeling
20%
Model-driven Development
19%
Security Protocol Implementations
19%
Formal Security
19%
Protocol Verification
19%
Formal Methods for Security
19%
Extended Abstracts
19%
Modeling Analysis
19%
Distributed Protocol
19%
Distributed Systems
19%
E-payment
17%
Formal Methods
16%
Specification Language
15%
Verification Tool
15%
Set Abstraction
14%
Security Assurance
14%
Security Research
14%
Abstraction Methods
14%
Popular
14%
Abstract Model
12%
Security Goals
12%
Compiler
12%
Java Programming
12%
Consistency Checking
12%
Automated Verification
12%
Development Approach
12%
Java Implementation
11%
Distributed Applications
11%
Cloud Computing
11%
Software Security Education
9%
Protocol Attacks
9%
Banking Standards
9%
Transaction Protocol
9%
Android Application Development
9%
Attack Tracing
9%
Open Banking
9%
Security Evaluation
9%
Graphical Network Simulator
9%
Network Emulation
9%
White-box Cryptography
9%
EU Projects
9%
Vehicle Communication System
9%
Revocation
9%
Protocol Modeling
9%
Computer Science
Security protocols
100%
Security Analysis
42%
Automatic Generation
36%
Security Properties
26%
model-driven development
22%
Electronic Payment
22%
Research Community
20%
formal modeling
20%
Code Generation
19%
Protocol Verification
19%
Authentication
19%
Payment Protocol
19%
Distributed Systems
19%
Distributed Protocol
14%
Case Study
12%
Blockchain
12%
Distributed Application
11%
model checker
11%
Cloud Computing
11%
Consistency Check
11%
Development Approach
11%
Specification Language
11%
Application Development
9%
Term Maintenance
9%
Protocol Attack
9%
European Country
9%
Financial Service Industry
9%
Security Evaluation
9%
Android Application
9%
Application Design
9%
Hardware Security Module
9%
Certification Authority
9%
Bitcoin
9%
Protocol Specification
9%
Design Verification
9%
Acceptable Solution
9%
Provider Service
9%
Design Implementation
9%
Communication Protocol
9%
Performance Evaluation
9%
Security Protocol
9%
Fog Computing
9%
Data Sharing
9%
Key Requirement
9%
Software Security
9%
Access Control
9%
Network Simulator
9%
Interoperability
9%
Software-Defined Networking
9%
Development Process
9%