This repository is about the final essay for the Computer Network Security master degree course I attended as a Bachelor student.
Three security protocol analysis tools will be compared: Proverif, Tamarin-prover and Verifpal. All of these tools employ a symbolic model.
- M. Jarosz, K. Wrona and Z. Zieliński, "Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices," 2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS), 2022, pp. 617-625, doi: 10.15439/2022F169.