Revised CFP (extended deadline): Financial Cryptography 2002

2001-11-01 Thread Matt Blaze
Revised Call for Papers Financial Cryptography '02 NOTE EXTENDED DEADLINE March 11-14, 2002 Sonesta Beach Resort Southhampton,

Proving security protocols

2001-11-01 Thread Roop Mukherjee
I have being trying to read about formally proving security protocols. I have seen the work of Needham, Paulson et. al., Meadows among others. I was wondering if anyone here has seen a comparison between these approaches to evaluate things like ease of use and effectiveness. I mean something

Rubber hose attack

2001-11-01 Thread vertigo
On Wed, 31 Oct 2001 [EMAIL PROTECTED] wrote: In closed systems, yes. However, even in those environments there is a substantial risk, because there really are no trusted, or otherwise authoritative third parties, short of a full blown background check. Approximately 80% of all attacks are

Re: Rubber hose attack

2001-11-01 Thread JohnE37179
In a message dated 11/1/01 11:09:21 AM, [EMAIL PROTECTED] writes: It appears that a lot of work has to be done and a lot of money spent before even a small amount of trust in an individual's proof of identity (on a world- or Internet-wide scale) can be established. Not really. The problem

Re: Proving security protocols

2001-11-01 Thread Ariel Waissbein
there are several soures to investigate. a nice survey varieties of secure distributed computing by matt franklin and moti yung introduces lots of protocos with proofs of security for most. the survey is available on the net, and includes a huge bibliography list form where you can carry on.

Re: Proving security protocols

2001-11-01 Thread Don Davis
I have been trying to read about formally proving security protocols. ... I was wondering if anyone here has seen a comparison between these approaches to evaluate things like ease of use and effectiveness. 5 years ago, i saw meadows give an interesting talk, comparing the various

Re: Proving security protocols

2001-11-01 Thread Jim Choate
Might try, Modelling and Analysis of Security Protocols P. Ryan, S. Schneider ISBN 0-201-67471-8 Can't say it has exactly what you're looking for though. On Thu, 1 Nov 2001, Roop Mukherjee wrote: I have being trying to read about formally proving security protocols. I have seen the work of