This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking. Skip to main content Skip to table of contents.
Advertisement Hide. Pages The Analysis of Security Protocols. The Inductive Method.
Verifying the Protocol Goals. The Principle of Goal Availability. Modelling Timestamping and Verifying a Classical Protocol.
Verifying a Deployed Protocol. Verifying Another Deployed Protocol. Modelling Smartcards.
Computer network security is critical to fraud prevention and accountability. security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. Information Security and Cryptography. Formal Correctness of Security Protocols. With 62 Figures and 4 Part of the Information Security and Cryptography book series (ISC). Download book PDF.
Anca Jurcut et al. Tutorial Content Half-Day Tutorial. Name and Affiliation.
Anca Jurcut. Dr Jurcut is a researcher with 10 years of experience.
Some of the key contributions of her research include: i development of a novel logic-based technique for the formal verification of protocols; ii design and implementation of an automated tool for the formal analysis and design validation of protocols; iii discovery of several hitherto unknown protocol design flaws and the publication of new verifiably correct protocols; iv development and publication of a new set of design guidelines to guarantee protocol robustness against attacks.
International Reputation: Dr. Jurcut has served as an expert evaluator and reviewer for many scientific panels e. She has co-organized several workshops and has served as a programme committee member and reviewer for most top international conferences and journals in her field.
Skip to main content. FVSP Tutorial.