Views

Eindhoven University of Technology


Netherlands

Verification of Security Protocols

Graduate

Information Security Technology

prof.dr. S. Etalle, dr. J.I. den Hartog

Modelling of black box security protocols, intruder model, security requirements, BAN logics and other security protocol logics, process algebraic approach to security protocol verification, model checking. Spi calculus, strand spaces, operational models, security protocols in action.


Offline



We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more