TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
Accountability | |
Alloy | |
Attack Trees | |
attestation | |
authentication | |
Automated verification | |
B | |
Bug bounty | |
C | |
choreographies | |
complexity | |
Constraint Solver | |
Counterexamples | |
CPSA | |
Crypto API | |
cryptographic protocol analysis | |
Cryptographic Protocol Shapes Analyzer (CPSA) | |
Cryptographic Protocols | |
cryptography | |
cryptosystem | |
cybersecurity | |
Cybersecurity and Fraud | |
D | |
differential privacy | |
dimension theory | |
distance bounding protocols | |
Distributed Systems | |
E | |
envelope protocol | |
epistemic logic | |
F | |
F* | |
federated data trading | |
Fine-grained Access Control | |
formal methods | |
formal verification | |
G | |
geometric logic | |
Georg Cantor | |
Giuseppe Peano | |
H | |
High-assurance communication | |
hoare logic | |
I | |
information flow | |
K | |
Key management | |
L | |
L.E.J. Brouwer | |
Layered Attestation | |
M | |
mandatory security policies | |
mathematical intuition | |
mathematical logic | |
mechanized proofs | |
model finding | |
multiset rewriting | |
N | |
Node-RED | |
O | |
onion address | |
P | |
physical properties | |
popularization paper | |
Preorders | |
pricing mechanism | |
protocol analysis | |
protocol logic | |
Protocol verification | |
Q | |
Quantum Computing | |
R | |
Racket | |
Remote debugging | |
Runtime Monitoring | |
S | |
SAT solving | |
secure locatization protocols | |
Secure voting systems | |
security | |
security protocols | |
self-authentication | |
Selfie attack | |
SMT Solving | |
software independence | |
strand spaces | |
Support Vector Machine | |
T | |
The MITRE Corporation | |
Time-Sensitive Distributed Systems | |
TLS Certificates | |
topology | |
Transport Layer Security | |
Trigger-Action Platform (TAP) | |
trust | |
U | |
Unified Payment Interface | |
V | |
Verifiable voting systems | |
Verified compilation | |
W | |
website authentication |