F. Javier Thayer
Secure communication over insecure networks presupposes reliable exchange of session keys for encryption and reliable methods of authenticating interlocutors. These goals are achieved by security protocols. Though many security protocols have been proposed they are very hard to get right and very often exhibit subtle flaws. In this talk we will consider a graph-based model to understand and reason about security protocols.