Sound Verification of Security Protocols - From Design to Interoperable Implementations
Offered By: IEEE via YouTube
Course Description
Overview
Explore a 15-minute conference talk that delves into the sound verification of security protocols, covering the entire process from design to interoperable implementations. Learn from experts Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David Basin, and Peter Müller as they present their research findings and insights. Gain valuable knowledge on ensuring the reliability and security of protocols through rigorous verification methods, and understand how these techniques can be applied to create robust, interoperable implementations in real-world scenarios.
Syllabus
Sound Verification of Security Protocols: From Design to Interoperable Implementations
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity