18-739 Foundations of Security and Privacy


Collections on protocols analysis

Background Reading on SSL 3.0

RFCs and Internet-Drafts

Contract signing protocols

Protocols for Anonymity

Probabilistic Model Checking

Protocol Verification by the Inductive Method

Logic for Computer Security Protocols

Symbolic Protocol Analysis

Security in Process Calculus

Game-Based Verification of Protocols

Software Model-Checking

Cryptographic Soundness

Distributed Access Control


Language-based Security