Verification of Security Protocols
Information Security Technology
prof.dr. S. Etalle, dr. J.I. den Hartog
Modelling of black box security protocols, intruder model, security requirements, BAN logics and other security protocol logics, process algebraic approach to security protocol verification, model checking. Spi calculus, strand spaces, operational models, security protocols in action.