Formal Methods for Information Security
-
Srdan Krstic, Ralf Sasse, Christoph Sprenger
-
Spring Semester
-
Location: rack 10, shelf 2
The course focuses on formal methods for the modeling and analysis of security protocols for critical systems, ranging from authentication protocols for network security to electronic voting protocols and online banking. In addition, we will also introduce the notions of non-interference and runtime monitoring.
![]() READING ROOM ONLY
NOT AVAILABLE
![]() The modelling and analysis of security protocolsThe CSP approach P.Y.A. Ryan and S.A. Schneider
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() READING ROOM ONLY
NOT AVAILABLE
![]() ![]() Formal correctness of security protocolsGiampaolo Bella
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() READING ROOM ONLY
NOT AVAILABLE
![]() ![]() Operational semantics and verification of security protocolsCas Cremers, Sjouke Mauw
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() READING ROOM ONLY
NOT AVAILABLE
![]() ![]() Protocols for authentication and key establishmentColin Boyd, Anish Mathuria
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() READING ROOM ONLY
NOT AVAILABLE
![]() ![]() Handbook of applied cryptographyAlfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
|