Skip to main navigation
Skip to search
Skip to main content
Teesside University's Research Portal Home
Home
Profiles
Research units
TeesRep
Student theses
Projects
Datasets
Equipment
Press/Media
Search by expertise, name or affiliation
Formal Modeling and Security Analysis of Security Protocols
Paolo Modesti
, Rémi Garcia
Centre for Digital Innovation
Department of Computing & Games
School of Computing, Engineering & Digital Technologies
Research output
:
Chapter in Book/Report/Conference proceeding
›
Chapter
41
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Formal Modeling and Security Analysis of Security Protocols'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Modeling Analysis
100%
Formal Modeling
100%
Security Analysis
100%
Security Protocols
100%
Formal Security
100%
Automated Verification
33%
Electronic Commerce
33%
Online Services
33%
Model Properties
33%
Verification Tool
33%
Error-prone
33%
Formal Verification
33%
Language Tools
33%
Specification Language
33%
E-payment
33%
Security Properties
33%
Blockchain
33%
User Expertise
33%
Protocol Development
33%
Practical Applicability
33%
Specification Validation
33%
Secure Software
33%
Cryptographic Protocols
33%
Attacker Model
33%
Computer Science
Security protocols
100%
formal modeling
100%
Security Analysis
100%
Case Study
33%
Specification Language
33%
Critical Component
33%
Electronic Payment
33%
Security Properties
33%
Blockchain
33%
Attacker Model
33%
Cryptographic Protocol
33%