Eindhoven University of Technology


Verification of Security Protocols


Information Security Technology

prof.dr. S. Etalle, dr. J.I. den Hartog

Modelling of black box security protocols, intruder model, security requirements, BAN logics and other security protocol logics, process algebraic approach to security protocol verification, model checking. Spi calculus, strand spaces, operational models, security protocols in action.


We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more