Security Protocol Verification
In this lecture course I will present the applied Pi-calculus, a
process calculus specifically designed for the verification of
security protocols. I will give example of security protocols and
security properties and show how both the protocols and the
properties can be modelled in the applied Pi-calculus. I will also
briefly present ProVerif, which is a tool for automatically verifying
security properties specified in the applied Pi-calculus.
Slides
Last modified: Mon Mar 30 16:27:44 CEST 2015