Much attention has been paid to the design of languages for the specification of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol flaws arise out of a misunderstanding of the protocol's requirements. In this talk we give a brief survey of the history of requirements specification in formal analysis of cryptographic protocols. We outline the main approaches and describe some of the open issues. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Meadows, C. (2003). What makes a cryptographic protocol secure? The evolution of requirements specification in formal cryptographic protocol analysis. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2618, 10–21. https://doi.org/10.1007/3-540-36575-3_2
Mendeley helps you to discover research relevant for your work.