No full text
Book published as author, translator, etc. (Books)
Security Protocols and Threat Models: Security and Privacy via The Applied π-Calculus
GIL PONS, Reynaldo; Horne, Ross; MAUW, Sjouke et al.
2026Springer Cham
Editorial reviewed
 

Files


Full Text
No document available.

Send to



Details



Keywords :
Authentication; Bisimilarity; Modal logic; Process calculi; Proof systems; Proof system; Protocol modeling; Security and privacy; Security properties; Security protocols; Security threats; Threat modeling; Safety, Risk, Reliability and Quality; Computer Networks and Communications; Computational Theory and Mathematics
Abstract :
[en] Protocols connect the many devices used in our personal and professional lives. Hence we require assurances that they are secure in the face of threats. Security is too important to leave to intuition and experience alone. We need methodologies to precisely determine our security goals. A security property is one that holds despite the best efforts of an attacker, as captured by a threat model. When attacking a protocol, an eavesdropper may inject messages leading to sessions being hijacked and other data breaches. This textbook goes from intuition, to theory, to tools, explaining different security properties. Ubiquitous protocols keep the discussion real: ePassport protocols used at border checkpoints; the EMV protocol for contactless payments; and Open ID Connect used to sign in to websites. Even threats enabling car theft via relay attacks are taken into consideration by authenticating proximity. The book also analyses threats to privacy such as tracking, mitigated by making sessions unlinkable. Topics and features: The learning curve brings readers to the edge of the topic of security protocols. Multiple security and privacy properties and threats are expressed in a core calculus. Large real-world case studies showcase the methods in practice. The theory informs the accurate usage of tools for checking security protocols. Minimal protocols are selected to cleanly illustrate new concepts. This textbook is designed to take readers with some grounding in computer science to the edge of the field of security protocols. Additionally, it can serve as a highly useful reference for established researchers and security professionals branching out into threat modelling.
Disciplines :
Computer science
Author, co-author :
GIL PONS, Reynaldo  ;  University of Luxembourg > Faculty of Science, Technology and Medicine > Department of Computer Science > Team Sjouke MAUW
Horne, Ross ;  Department of Computer and Information Sciences, University of Strathclyde, Glasgow, United Kingdom
MAUW, Sjouke ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
STUTZ, Felix  ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
YURKOV, Semen ;  University of Luxembourg > Faculty of Science, Technology and Medicine > Department of Computer Science > Team Sjouke MAUW
External co-authors :
yes
Language :
English
Title :
Security Protocols and Threat Models: Security and Privacy via The Applied π-Calculus
Publication date :
2026
Publisher :
Springer Cham
Peer reviewed :
Editorial reviewed
Available on ORBilu :
since 28 January 2026

Statistics


Number of views
5 (0 by Unilu)
Number of downloads
0 (0 by Unilu)

Scopus citations®
 
0
Scopus citations®
without self-citations
0
OpenCitations
 
0
OpenAlex citations
 
0

Bibliography


Similar publications



Contact ORBilu