@COMMENT This file was generated by bib2html.pl <https://sourceforge.net/projects/bib2html/> version 0.94
@COMMENT written by Patrick Riley <http://sourceforge.net/users/patstg/>
@Article{CK-fntpl-14,
  abstract =     {Security protocols are distributed programs that aim
                  at securing communications by the means of
                  cryptography. They are for instance used to secure
                  electronic payments, home banking and more recently
                  electronic elections. Given The financial and
                  societal impact in case of failure, and the long
                  history of design flaws in such protocol, formal
                  verification is a necessity. A major difference from
                  other safety critical systems is that the properties
                  of security protocols must hold in the presence of
                  an arbitrary adversary. The aim of this paper is to
                  provide a tutorial to some modern approaches for
                  formally modeling protocols, their goals and
                  automatically verifying them.},
  author =      {Cortier, V{\'e}ronique and Kremer, Steve},
  DOI =          {10.1561/2500000001},
  title =      {Formal Models and Techniques for Analyzing Security Protocols: A Tutorial},
  journal =      {Foundations and Trends in Programming Languages},
  year =      {2014},
  volume =      {1},
  number =      {3},
  pages =      {151-267},
} 
