Analysing Security Protocols

  • Dieter Gollmann
Conference paper

DOI: 10.1007/978-3-540-40981-6_8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2629)
Cite this paper as:
Gollmann D. (2003) Analysing Security Protocols. In: Abdallah A.E., Ryan P., Schneider S. (eds) Formal Aspects of Security. Lecture Notes in Computer Science, vol 2629. Springer, Berlin, Heidelberg

Abstract

We assess how formal methods can contribute to the design and analysis of security protocols. We explain some of the pitfalls when applying formal methods in too naïve a fashion and stress the importance of identifying implicit assumptions about the environment a protocol would be deployed in that may be hidden in verification methodologies or in off-the-shelf security properties.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Dieter Gollmann
    • 1
  1. 1.Microsoft ResearchCambridgeUnited Kingdom

Personalised recommendations