[9754] in cryptography@c2.net mail archive
Re: Proving security protocols
daemon@ATHENA.MIT.EDU (Jim Choate)
Thu Nov 1 20:15:26 2001
Date: Thu, 1 Nov 2001 17:23:31 -0600 (CST)
From: Jim Choate <ravage@ssz.com>
To: cryptography@wasabisystems.com
In-Reply-To: <Pine.LNX.4.30.0111010948540.12781-100000@styx.uwaterloo.ca>
Message-ID: <Pine.LNX.3.96.1011101172145.337I-100000@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Might try,
Modelling and Analysis of Security Protocols
P. Ryan, S. Schneider
ISBN 0-201-67471-8
Can't say it has exactly what you're looking for though.
On Thu, 1 Nov 2001, Roop Mukherjee wrote:
> I have being trying to read about formally proving security protocols. I
> have seen the work of Needham, Paulson et. al., Meadows among others.
>
> I was wondering if anyone here has seen a comparison between these
> approaches to evaluate things like ease of use and effectiveness. I mean
> something with a little more detail than the related work section of most
> of these papers.
> Is one of these approaches considered as "best-practice" or is more
> commonly used than the other?
> Can someone offer some criticism of the practice formal verification in
> general ?
--
____________________________________________________________________
The people never give up their liberties but under some delusion.
Edmund Burke (1784)
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage@ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com