Home Course description Syllabus Projects Lecture slides Tools and reference | |
Date |
Topic |
Download |
Jan 06 |
Introduction |
ppt,
pdf |
Jan 08 |
SSL/TLS Case Study |
ppt, pdf |
Jan 13 |
Key Exchange Protocols |
ppt,
pdf |
Jan 15 |
Experiences in the Formal Analysis of the
GDOI protocol (guest lecture by Catherine Meadows) |
ppt, pdf |
Jan 20 |
Contract-Signing Protocols |
ppt,
pdf |
Jan 22 |
Protocols for Anonymity |
ppt,
pdf |
Jan 27 |
Probabilistic Model Checking |
ppt,
pdf |
Feb 03 |
Inductive Method |
ppt,
pdf |
Feb 05 |
Probabilistic Contract-Signing |
ppt,
pdf |
Feb 10 |
Protocol Logic (part 1) |
ppt,
pdf |
Feb 12 |
Protocol Logic (part 2) |
ppt,
pdf |
Feb 17 |
Symbolic Protocol Analysis |
ppt,
pdf |
Feb 19 |
Security in Process Calculi |
ppt,
pdf |
Feb 24 |
Game-Based Verification of Fair Exchange
Protocols |
ppt
,pdf |
Feb 26 |
Probabilistic Polynomial-Time Process
Calculus |
ppt,
pdf |
|