Keyphrases
Abstract Model
12%
Abstraction Methods
14%
Android Application Development
9%
Attack Tracing
9%
Automated Verification
12%
Automatic Generation
36%
Banking Standards
9%
Bridging the Gap
19%
Cloud Computing
11%
Compiler
12%
Consistency Checking
12%
Development Approach
12%
Distributed Applications
11%
Distributed Protocol
19%
Distributed Systems
19%
E-payment
17%
EU Projects
9%
Extended Abstracts
19%
Formal Methods
16%
Formal Methods for Security
19%
Formal Modeling
20%
Formal Security
19%
Graphical Network Simulator
9%
Java Implementation
11%
Java Programming
12%
Model-driven Development
19%
Modeling Analysis
19%
Network Emulation
9%
Open Banking
9%
Payment Protocol
23%
Popular
14%
Protocol Attacks
9%
Protocol Verification
19%
Revocation
9%
Security Analysis
35%
Security Assurance
14%
Security Evaluation
9%
Security Goals
12%
Security Properties
22%
Security Protocol Implementations
19%
Security Protocols
95%
Security Research
14%
Security Verification
20%
Set Abstraction
14%
Software Security Education
9%
Specification Language
15%
Transaction Protocol
9%
Vehicle Communication System
9%
Verification Tool
15%
White-box Cryptography
9%
Computer Science
Acceptable Solution
9%
Access Control
9%
Android Application
9%
Application Design
9%
Application Development
9%
Authentication
19%
Automatic Generation
36%
Bitcoin
9%
Blockchain
12%
Case Study
12%
Cloud Computing
11%
Code Generation
19%
Communication Protocol
9%
Consistency Check
11%
Data Sharing
9%
Design Implementation
9%
Design Verification
9%
Development Approach
11%
Development Process
9%
Distributed Application
11%
Distributed Protocol
14%
Distributed Systems
19%
Electronic Payment
22%
Ethical Hacking
9%
European Country
9%
Financial Service Industry
9%
Fog Computing
9%
formal modeling
20%
Internet-Of-Things
9%
Interoperability
9%
Key Requirement
9%
model checker
11%
model-driven development
22%
Network Simulator
9%
Payment Protocol
19%
Performance Evaluation
9%
Protocol Attack
9%
Protocol Specification
9%
Protocol Verification
19%
Research Community
20%
Security Analysis
42%
Security Evaluation
9%
Security Policy
9%
Security Properties
26%
Security Protocol
9%
Security protocols
100%
Software Security
9%
Software-Defined Networking
9%
Specification Language
11%
Term Maintenance
9%