Formal Methods for Information Security

The course focuses on formal methods for the modeling and analysis of security protocols for critical systems, ranging from authentication protocols for network security to electronic voting protocols and online banking. In addition, we will also introduce the notions of non-interference and runtime monitoring.

AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

The modelling and analysis of security protocols

The CSP approach

P.Y.A. Ryan and S.A. Schneider

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.096.02.1 2001 10 / 2 Formal Methods for Information Security Available
Textbook.M.096.02.2 2001 10 / 2 Formal Methods for Information Security On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Handbook of applied cryptography

Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.096.01.1 1997 10 / 2 Formal Methods for Information Security Available
Textbook.M.096.01.2 1997 10 / 2 Formal Methods for Information Security Available
Textbook.B.072.02.1 1997 6 / 1 Information Security Available
Textbook.B.072.02.2 1997 6 / 1 Information Security Available
Textbook.B.072.02.3 1997 6 / 1 Information Security Available
Textbook.B.072.02.4 1997 6 / 1 Information Security Available
Textbook.B.072.02.5 1997 6 / 1 Information Security Available
Textbook.M.069.03.1 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.2 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.3 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.4 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.5 1997 / VLSI 2: From Netlist to Complete System on Chip Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Formal correctness of security protocols

Giampaolo Bella

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.096.04.1 2007 10 / 2 Formal Methods for Information Security Available
Textbook.M.096.04.2 2007 10 / 2 Formal Methods for Information Security On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Operational semantics and verification of security protocols

Cas Cremers, Sjouke Mauw

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.096.05.1 2012 10 / 2 Formal Methods for Information Security Available
doz.cremer.2012.01.2 2012 Available
doz.cremer.2012.01.1 2012 On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Protocols for authentication and key establishment

Colin Boyd, Anish Mathuria

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.096.03.1 2003 10 / 2 Formal Methods for Information Security Available
Textbook.M.096.03.2 2003 10 / 2 Formal Methods for Information Security On-site use only