Computer security ; Formal methods ; Protocols ; Symbolic methods ; Computational model ;

Proofs of Security Protocols - Symbolic Methods and Powerful Attackers

The use of communication protocols has become pervasive at all levels of our society. Yet, their uses come with risks, either about the security of the system or the privacy of the user. To mitigate those risks, we must provide the protocols with …