Proving security protocols

Jim Choate ravage at ssz.com
Thu Nov 1 18:23:31 EST 2001


Might try,

Modelling and Analysis of Security Protocols
P. Ryan, S. Schneider
ISBN 0-201-67471-8

Can't say it has exactly what you're looking for though.

On Thu, 1 Nov 2001, Roop Mukherjee wrote:

> I have being trying to read about formally proving security protocols. I
> have seen the work of Needham, Paulson et. al., Meadows among others.
> 
> I was wondering if anyone here has seen a comparison between these
> approaches to evaluate things like ease of use and effectiveness. I mean
> something with a little more detail than the related work section of most
> of these papers.
> Is one of these approaches considered as "best-practice" or is more
> commonly used than the other?
> Can someone offer some criticism of the practice formal verification in
> general ?


 --
    ____________________________________________________________________

     The people never give up their liberties but under some delusion.

                                             Edmund Burke (1784)

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list