In this paper we survey some of the most important formalisms that have been used to specify and analyze secure protocols. A number of notable examples are described. Very little is assumed in the way of background on security, only a certain willingness to engage a formal point of view and some intuitions about logic and proof.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 firstname.lastname@example.org
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 email@example.com