1
Cisco. “Cisco Annual Internet Report (2018-2023) White Paper” . Cisco, 2019. [Online]. Available: Link (External) [Accessed: May 5, 2023].
2
United Nations, “World Population Prospects 2022: Summary of Results” , Department of Economic and Social Affairs, Population Division, 2022. [Online]. Available: Link (External) [Accessed: May 5, 2023].
3
U.S. Department of Commerce. (2021). “ Global E-Commerce Sales: Size and Forecast” . International Trade Administration. Link (External) [Accessed: May 5, 2023].
4
“Saarland”, Wikipedia, [Online]. Available: Link (External) . [Accessed: May 5, 2023].
5
ITU. (2015). “ ICT facts and figures 2015 ”. International Telecommunication Union. [Online]. Available: Link (External) . [Accessed: May 4, 2023].
6
T. Dierks, E. Rescorla, (2008). “ The Transport Layer Security (TLS) Protocol Version 1.2” . IETF RFC 5246. [Online]. Available: Link (External) . [Accessed: May 4, 2023].
7
A. L. Russell, (2006). “'Rough Consensus and Running Code' and the Internet-OSI Standards War” . IEEE Annals of the History of Computing, 28(3), 48–61. Link (External)
8
E. Rescorla, [LinkedIn-Profil]. (n.d.). Available: Link (External) . [Accessed: May 4, 2023].
9
E. Rescorla, SSL and TLS: Designing and Building Secure Systems . Addison-Wesley Professional, 2000. Available: Link (External) . [Accessed: May 4, 2023].
10
E. Rescorla, SSL and TLS: Designing and Building Secure Systems , Addison-Wesley Professional, 2000. Available: Link (External) . [Accessed: May 4, 2023].
11
C. Jones, P. O'Hearn, J. Woodcock, “Verified Software: A Grand Challenge” , Computer, vol. 39, pp. 93–95, April 2006.
12
T. Hoare, "The verifying compiler: A grand challenge for computing research" , Journal of the ACM, vol. 50, no. 1, pp. 63-69, January 2003.
13
J. Alben. “Formal Verification Specialist Oski Joins NVIDIA | NVIDIA Blog” . NVIDIA Blog. Available: Link (External) . [Accessed: February 10, 2023].
14
T. Ball, B. Cook, V. Levin, S. K. Rajamani, "SLAM and Static Driver Verifier: Technology Transfer of Formal Methods inside Microsoft" , January 28, 2004, Publications of the SLAM project, Redmond, WA 98052, United States of America. [Online]. Available: Link (External) . [Accessed: February 10, 2023].
15
Prof. Dr. C. Cremers, personal communication, April 5, 2022.
16
G. Bella, Formal Correctness of Security Protocols , Berlin, Germany: Springer, 2007.
17
“Tamarin Prover” , Available: Link (External) . [Accessed: May 25, 2023].
18
Dr. S. Scott, personal communication, May 28, 2020.
19
Dr. S. Scott, personal communication, May 28, 2020.
20
D. Basin, C. Cremers, J. Dreier, and R. Sasse, “Tamarin: Verification of Large-Scale, Real World, Cryptographic Protocols” , IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers.
“Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication” , YouTube, [Video published on Sep 2, 2016], Available: Link (External) . [Accessed: May 30, 2023].
D. Basin, C. Cremers, J. Dreier, and R. Sasse, “Tamarin: Verification of Large-Scale, Real World, Cryptographic Protocols” , IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers.
21
22
23
S. Scott,
“[TLS] Revision 10: possible attack if client authentication is allowed during PSK”
, TLS Mailing List, message sent on October 31, 2015. Available:
Link (External)