Sound Verification of Security Protocols - From Design to Interoperable Implementations
Offered By: IEEE via YouTube
Course Description
Overview
Explore a 15-minute conference talk that delves into the sound verification of security protocols, covering the entire process from design to interoperable implementations. Learn from experts Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David Basin, and Peter Müller as they present their research findings and insights. Gain valuable knowledge on ensuring the reliability and security of protocols through rigorous verification methods, and understand how these techniques can be applied to create robust, interoperable implementations in real-world scenarios.
Syllabus
Sound Verification of Security Protocols: From Design to Interoperable Implementations
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera