Applying formal methods to cryptographic protocol analysis

ISSN: 16113349
0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Protocols using encryption to communicate securely and privately are essential to the protection of our infrastructure. However, since they must be designed to work even under the most hostile conditions, it is not easy to design them correctly. As a matter of fact, it is possible for such protocols to be incorrect even if the cryptographic algorithms they use work perfectly. Thus, over the last few years there has been considerable interest in applying formal methods to the problem of verifying that these protocols are correct. In this talk we give a brief history of this area, and describe some of the emerging issues and new research problems.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Meadows, C. (2000). Applying formal methods to cryptographic protocol analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1855, p. 2). Springer Verlag.

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 5

71%

Professor / Associate Prof. 1

14%

Researcher 1

14%

Readers' Discipline

Tooltip

Computer Science 8

100%

Save time finding and organizing research with Mendeley

Sign up for free