1. Non-repudiation
- Validity of evidence and fairness
- Application to e-commerce
- Application to delegation
- Application to certified e-mail
2. Essentials of penetration testing
- Metasploit
- Kali Linux
- Information gathering
3. Tools for security protocol verification
- Theorem proving: the Inductive Method
- Model checking: Avispa
- Ad hoc tools: Proverif
1. Non-repudiation
- Validity of evidence and fairness
- Application to e-commerce
- Application to delegation
- Application to certified e-mail
2. Essentials of penetration testing
- Metasploit
- Kali Linux
- Information gathering
3. Tools for security protocol verification
- Theorem proving: the Inductive Method
- Model checking: Avispa
- Ad hoc tools: Proverif
Lecture notes offered by the lecturer.
Lecture notes offered by the lecturer.