Keyphrases
Stateful
100%
Formal Analysis
91%
Hardware Devices
66%
Append-only Logs
50%
Messaging Protocol
50%
Mobile Telephony
50%
Multi-device
50%
Key Refreshment
50%
User Privacy
50%
Decryption Key
50%
Direct Anonymous Attestation
50%
Telephony System
50%
Encryption-decryption
50%
Tamarin Prover
50%
Observational Equivalence
50%
Anonymity
50%
Security Properties
50%
ProVerif
50%
Concept Implementation
50%
Trusted Party
50%
Compiler
50%
Applied pi Calculus
50%
Private States
37%
Biosimilarity
37%
Global State
33%
User Unlinkability
25%
Protocol Vulnerabilities
25%
Automatic Verification
25%
Attacker
25%
Real-time Networks
25%
ProVerif Tool
25%
Unlinkability
25%
Prototype Implementation
25%
Key Validation
16%
Log-Based
16%
Smart Card
16%
Hardware Security
16%
Validation Protocol
16%
Attestation Protocols
16%
Explicit State
16%
Verifier
16%
Process Calculi
16%
Security Device
16%
Weak Assumption
16%
Equivalence Properties
16%
Passive Adversary
16%
Corrupt
16%
Vulnerability
16%
Issuer
16%
Horn Clauses
16%
Process Language
16%
Service Provider
16%
Log Data
16%
Automated Reasoning
16%
Public Key
16%
Contract Signing Protocol
16%
Web Application
16%
Operational Semantics
16%
Hardware Module
12%
Revised Version
12%
Bisimulation
12%
Internal State
12%
Computer Science
Hardware Device
100%
Observational Equivalence
50%
Automated Reasoning
50%
Telephony System
50%
Key Infrastructure
50%
Security Properties
50%
Decryption
50%
Hardware Security
50%
Security Device
50%
User Privacy
50%
Desired Property
50%
Smart Card
50%
Operational Semantics
50%
Anonymity
50%
Attackers
25%
Actual Attack
25%
Theoretical Framework
25%
public key
16%
Data Structure
16%
Log Data
16%
Web-Based Application
16%
Revised Version
12%
Computer Hardware
12%
Internal State
12%