--- a/index.html	Fri Sep 20 11:35:35 2019 +0100
+++ b/index.html	Fri Sep 20 11:43:23 2019 +0100
@@ -249,7 +249,7 @@
 
   In our formalisation we use the inductive method we learned from
   <A HREF="https://www.cl.cam.ac.uk/~lp15/">Prof. Larry Paulson</A>.
-  He used this method in order to prove the correctness of security
+  He used this method in order to prove the correctness of cryptographic
   protocols. We have implemented our algorithm on top of the
   the small <A HREF="https://en.wikipedia.org/wiki/Pintos">PINTOS</A>
   operating system used for teaching (we passed all their test cases and were