Skip to main navigation
Skip to search
Skip to main content
Teesside University's Research Portal Home
Search content at Teesside University's Research Portal
Home
Profiles
Research units
TeesRep
Student theses
Projects
Datasets
Equipment
Press/Media
Formal Modeling and Security Analysis of Security Protocols
Paolo Modesti
, Rémi Garcia
Centre for Digital Innovation
Department of Computing & Games
School of Computing, Engineering & Digital Technologies
Research output
:
Chapter in Book/Report/Conference proceeding
›
Chapter
82
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Formal Modeling and Security Analysis of Security Protocols'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Modeling Analysis
100%
Formal Modeling
100%
Security Analysis
100%
Security Protocols
100%
Formal Security
100%
Automated Verification
33%
Electronic Commerce
33%
Online Services
33%
Model Properties
33%
Verification Tool
33%
Error-prone
33%
Formal Verification
33%
Language Tools
33%
Specification Language
33%
E-payment
33%
Security Properties
33%
Blockchain
33%
User Expertise
33%
Protocol Development
33%
Practical Applicability
33%
Specification Validation
33%
Secure Software
33%
Cryptographic Protocols
33%
Attacker Model
33%
Computer Science
Security protocols
100%
formal modeling
100%
Security Analysis
100%
Case Study
33%
Specification Language
33%
Critical Component
33%
Electronic Payment
33%
Security Properties
33%
Blockchain
33%
Attacker Model
33%
Cryptographic Protocol
33%