2006
DOI: 10.1007/11766155_9
|View full text |Cite
|
Sign up to set email alerts
|

Developing Provable Secure M-Commerce Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2009
2009

Publication Types

Select...
2
2
1

Relationship

4
1

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…Full details on the abstract model of Cindy as well as the details on the verification of security properties on this abstract level can be found in [10]. The next section describes the approach for verifying an implementation of Cindy running on a mobile phone written in J2ME.…”
Section: The Cindy Case Studymentioning
confidence: 99%
“…Full details on the abstract model of Cindy as well as the details on the verification of security properties on this abstract level can be found in [10]. The next section describes the approach for verifying an implementation of Cindy running on a mobile phone written in J2ME.…”
Section: The Cindy Case Studymentioning
confidence: 99%
“…Besides the communication protocols of the presented electronic wallet application we already formalized other cryptographic protocols, e.g. the Needham-Schroeder Public-Key authentication protocol and other m-commerce applications [GHRS06].…”
Section: Resultsmentioning
confidence: 99%
“…[Sch01] describes a verification method for ASM refinement based on forward simulation and Dynamic Logic. In [GHRS06] such a refinement is defined and verified for an electronic ticketing application.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations