• Homepage
  • Navigation
  • Search
  • Content
  • Footer
  • Contact
  • Sitemap

Information Security Group

Main Navigation

  • News & Events
    • News & EventsSee overview
    • News 2025
    • News 2024
    • News 2023
    • News 2022
    • News 2021
    • News 2020
    • News 2019
    • News 2018
    • News 2017
    • News 2016
    • News 2015
    • News 2014
    • News 2013
    • News 2012
    • News 2011
  • The Group
    • The GroupSee overview
    • How to Find Us
    • Social events
    • Open Positions
  • People
    • PeopleSee overview
    • Alumni
    • Visitors
  • Education
    • EducationSee overview
    • Student projects
      • Ongoing student projects
      • Previous student projects
    • Spring semester 2025
      • Formal Methods and Functional Programming
      • Information Security
      • Formal Methods for Information Security
    • Autumn semester 2024
      • Security Engineering
      • Current Topics in Information Security
    • Spring semester 2024
      • Formal Methods and Functional Programming
      • Information Security
      • Formal Methods for Information Security
    • Autumn semester 2023
      • Applied Security Laboratory
      • Current Topics in Information Security
    • Spring semester 2023
      • Formal Methods and Functional Programming
      • Information Security
      • Computer-Aided Modelling and Reasoning
    • Autumn semester 2022
      • Security Engineering
      • Applied Security Laboratory
      • Current Topics in Information Security
    • Spring semester 2022
      • Formal Methods and Functional Programming
      • Formal Methods for Information Security
      • Information Security
    • Autumn semester 2021
      • Security Engineering
      • Applied Security Laboratory
      • Current Topics in Information Security
    • Previous semesters
  • Research
    • ResearchSee overview
    • Projects
      • Runtime Policy Monitoring and Enforcement
      • Igloo: End-to-End Verification of Distributed Systems
      • Analyzing Website Compliance with Privacy Regulations (GDPR and ePrivacy)
      • Authentication of Physical Documents
      • Cyber Trust Project
      • Formal Verification with the Tamarin Prover
      • Full-Stack Verification of Secure Inter-Domain Routing Protocols
      • An Authentic Digital EMblem (ADEM)
      • Model-driven Security and Privacy
      • Exploring Mechanisms of Website Compliance with Privacy Regulations
      • add Display all
    • Completed projects
    • Publications
      • Publications 2025
      • Publications 2024
      • Publications 2023
      • Publications 2022
      • Publications 2021
      • Publications 2020
      • Publications 2019
      • Publications 2018
      • Publications 2017
      • Publications 2016
      • Publications 2015
      • Publications 2014
      • Publications 2013
      • Publications 2012
      • Publications 2011
      • Publications 2010
      • Publications 2009
      • Publications 2008
      • Publications 2007
      • Publications 2006
      • Publications 2005
      • Publications 2004
      • Publications 2003
      • Publications 2002
      • Publications 2001
      • Publications 2000
      • Publications 1999
      • Publications 1998
      • Publications 1997
      • add Display all
    • Software
      • The scyther-proof security protocol verification tool
      • FAST
      • SecFuzz
      • Midpoint Synthesis
      • MonPoly
      • ProtoVeriPhy
      • Developing Security Protocols by Refinement
      • Verification of IBM 4765's Persistent Memory Manager
      • BelLog
      • Alice&Bob protocols
      • The Scyther-Abstraction tool
      • SpCTL Synthesizer
      • The Consensus Verifier
      • WebCheck - Test Execution Checkpointing for Web Applications
      • Aerial
      • Account Access Graphs
      • CookieBlock - privacy enforcement extension
      • add Display all

Search

EN

Departments

  • ETH Zurich
  • D-INFK
  • Institute of Information Security
  • Information Security Group

Language Selection

  • English

You are here

  • Homepage chevron_right
  • Education chevron_right
  • …
  • Spring semester 2017

Spring semester 2017

Childpage navigation

  • Formal Methods and Functional Programmingchevron_right
  • Formal Methods for Information Securitychevron_right
  • Information Securitychevron_right

Lectures

  • Formal Methods and Functional Programming
  • Formal Methods for Information Security
  • Information Security

Related Content

  • chevron_rightStudent projects
  • chevron_rightSpring semester 2025
  • chevron_rightAutumn semester 2024
  • chevron_rightSpring semester 2024
  • chevron_rightAutumn semester 2023
  • chevron_rightSpring semester 2023
  • chevron_rightAutumn semester 2022
  • chevron_rightSpring semester 2022
  • chevron_rightAutumn semester 2021
  • chevron_rightPrevious semesters
chevron_leftEducation

Footer

Search

Services

  • Student portal
  • Alumni association
  • Staffnet
  • Contact
  • Login

Departments

  • D-ARCH Architecture
  • D-BAUG Civil, Environmental and Geomatic Engineering
  • D-BIOL Biology
  • D-BSSE Biosystems Science and Engineering
  • D-CHAB Chemistry and Applied Biosciences
  • D-EAPS Earth and Planetary Sciences
  • D-GESS Humanities, Social and Political Sciences
  • D-HEST Health Sciences and Technology
  • D-INFK Computer Science
  • D-ITET Information Technology and Electrical Engineering
  • D-MATH Mathematics
  • D-MATL Department of Materials
  • D-MAVT Mechanical and Process Engineering
  • D-MTEC Management, Technology and Economics
  • D-PHYS Physics
  • D-USYS Environmental Systems Science

Table of contents and legal

  • Sitemap
  • Imprint
  • Accessibility Statement
  • Disclaimer & Copyright
  • Privacy Policy
© 2025  Eidgenössische Technische Hochschule Zürich
JavaScript has been disabled in your browser