| Lecture Notes |
References |
Introduction in Modeling and Verification of Security Protocols
Whiteboard
| |
Security Protocol Attacks
Whiteboard
|
Veronique Cortier, Stephanie Delaune, Pascal Lafourcade,
A Survey of Algebraic Properties Used in Cryptographic Protocols,
Journal of Computer Security, 2006.
|
AVISPA - Automated Validation of
Internet Security Protocols and Applications
Whiteboard
|
The Avispa Team,
HLPSL Tutorial, 2006.
The Avispa Team,
AVISPA v1.1 User Manual, 2006.
|
|
Automated Verification of Multi-Party E-Commerce Protocols (I)
|
Cătălin V. Bîrjoveanu and Mirela Bîrjoveanu,
Secure Multi-Party E-Commerce Protocols,
SpringerBriefs in Computer Science. Springer, Cham, 2022.
Cătălin V. Bîrjoveanu and Mirela Bîrjoveanu,
Automated Verification of E-Commerce Protocols for Complex Transactions,
E-Business and Telecommunications. Communications in Computer and Information Science,
vol. 1118 CCIS. Springer, Cham, 2019.
|
|
Automated Verification of Multi-Party E-Commerce Protocols (II)
|
|
|
Verification of Security Protocols using Hybrid Techniques (I) |
Cas Cremers, Sjouke Mauw,
Operational Semantics and Verification of Security Protocols,
Information Security and Cryptography series, Springer, 2012, Chapters 3, 4.
|
|
Verification of Security Protocols using Hybrid Techniques (II) |
Cas Cremers, Sjouke Mauw,
Operational Semantics and Verification of Security Protocols,
Information Security and Cryptography series, Springer, 2012, Chapter 5.
|
|
Security Protocol Verification Techniques |
|
|
Type Flaw and Multi-Protocol Attacks |
Cas Cremers, Sjouke Mauw,
Operational Semantics and Verification of Security Protocols,
Information Security and Cryptography series, Springer, 2012, Chapter 6.
Bruno Blanchet, Andreas Podelski,
Verification of Cryptographic Protocols: Tagging Enforces Termination,
FoSSaCS 2003.
James Heather, Gavin Lowe, Steve Schneider,
How to Prevent Type Flaw Attacks on Security Protocols,
CSFW 2000.
|
|
Modeling and Verifying Security Protocols Using Tamarin (I) |
Tamarin Prover, 2024.
|
|
Modeling and Verifying Security Protocols Using Tamarin (II) |
|