@COMMENT This file was generated by bib2html.pl version 0.94
@COMMENT written by Patrick Riley
@InCollection{CK-marktoberdorf16,
abstract = {Security protocols are distributed programs that aim
at securing communications by the means of
cryptography. They are for instance used to secure
electronic payments, home banking and more recently
electronic elections. Given the financial and
societal impact in case of failure, and the long
history of design flaws in such protocols, formal
verification is a necessity. A major difference from
other safety critical systems is that the properties
of security protocols must hold in the presence of
an arbitrary adversary. The aim of these notes is to
provide a tutorial to some modern approaches for
formally modeling protocols, their goals and
automatically verifying them.},
author = {V{\'{e}}ronique Cortier and Steve Kremer},
title = {Formal Models for Analyzing Security Protocols: Some
Lecture Notes},
booktitle = {Dependable Software Systems Engineering},
publisher = {{IOS} Press},
year = 2016,
editor = {Javier Esparza and Orna Grumberg and Salomon
Sickert},
volume = 45,
series = {{NATO} Science for Peace and Security Series - {D:}
Information and Communication Securit},
pages = {33--58},
isbn = {978-1-61499-626-2},
url = {https://doi.org/10.3233/978-1-61499-627-9-33},
doi = {10.3233/978-1-61499-627-9-33},
}