Charlie Jacomme
Charlie Jacomme
Home
Open Positions
Teaching
Non Academic Materials
Contact
Light
Dark
Automatic
Computer security ; Formal methods ; Protocols ; Symbolic methods ; Computational model ;
Proofs of Security Protocols - Symbolic Methods and Powerful Attackers
The use of communication protocols has become pervasive at all levels of our society. Yet, their uses come with risks, either about the security of the system or the privacy of the user. To mitigate those risks, we must provide the protocols with …
Cite
×