Result Details

Specification of Traces in the Security Protocols Analysis

OČENÁŠEK, P. Specification of Traces in the Security Protocols Analysis. Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES. Dubrovnik: Institute of Electrical and Electronics Engineers, 2011. p. 115-118. ISBN: 978-953-7138-20-2.
Type
conference paper
Language
English
Authors
Abstract

The paper demonstrates the security protocol analysis with the step-by-step approach. The analysis is performed from each party's point of view and is followed with the operational analysis of message exchanges.

Keywords

Needham Schroeder, security protocol, analysis, verificaton.

Published
2011
Pages
115–118
Proceedings
Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES
Conference
33rd International Conference on INFORMATION TECHNOLOGY INTERFACES
ISBN
978-953-7138-20-2
Publisher
Institute of Electrical and Electronics Engineers
Place
Dubrovnik
BibTeX
@inproceedings{BUT76347,
  author="Pavel {Očenášek}",
  title="Specification of Traces in the Security Protocols Analysis",
  booktitle="Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES",
  year="2011",
  pages="115--118",
  publisher="Institute of Electrical and Electronics Engineers",
  address="Dubrovnik",
  isbn="978-953-7138-20-2"
}
Projects
Advanced recognition and presentation of multimedia data, BUT, Vnitřní projekty VUT, FIT-S-11-2, start: 2011-01-01, end: 2013-12-31, completed
Advanced secured, reliable and adaptive IT, BUT, Vnitřní projekty VUT, FIT-S-11-1, start: 2011-01-01, end: 2013-12-31, completed
Security-Oriented Research in Information Technology, MŠMT, Institucionální prostředky SR ČR (např. VZ, VC), MSM0021630528, start: 2007-01-01, end: 2013-12-31, running
Research groups
Departments
Back to top