Formal Methods for Information Security
- Srdan Krstic, Ralf Sasse, Christoph Sprenger
- Spring Semester
- Location: rack 10, shelf 2 VVZ-ID: 263-4600-00L Lecture homepage
The course focuses on formal methods for the modeling and analysis of security protocols for critical systems, ranging from authentication protocols for network security to electronic voting protocols and online banking. In addition, we will also introduce the notions of non-interference and runtime monitoring.
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
The modelling and analysis of security protocolsThe CSP approach P.Y.A. Ryan and S.A. Schneider
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Handbook of applied cryptographyAlfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Formal correctness of security protocolsGiampaolo Bella
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Operational semantics and verification of security protocolsCas Cremers, Sjouke Mauw
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Protocols for authentication and key establishmentColin Boyd, Anish Mathuria
|