@COMMENT This file was generated by bib2html.pl version 0.94
@COMMENT written by Patrick Riley
@Article{CK-fntpl-14,
abstract = {Security protocols are distributed programs that aim
at securing communications by the means of
cryptography. They are for instance used to secure
electronic payments, home banking and more recently
electronic elections. Given The financial and
societal impact in case of failure, and the long
history of design flaws in such protocol, formal
verification is a necessity. A major difference from
other safety critical systems is that the properties
of security protocols must hold in the presence of
an arbitrary adversary. The aim of this paper is to
provide a tutorial to some modern approaches for
formally modeling protocols, their goals and
automatically verifying them.},
author = {Cortier, V{\'e}ronique and Kremer, Steve},
DOI = {10.1561/2500000001},
title = {Formal Models and Techniques for Analyzing Security Protocols: A Tutorial},
journal = {Foundations and Trends in Programming Languages},
year = {2014},
volume = {1},
number = {3},
pages = {151-267},
url = {https://members.loria.fr/skremer/files/Papers/CK-fntpl-14.pdf},
}