Publication result detail

Security Protocols: Analysis and Design

OČENÁŠEK, P.

Original Title

Security Protocols: Analysis and Design

English Title

Security Protocols: Analysis and Design

Type

Paper in proceedings outside WoS and Scopus

Original Abstract

The security protocols areused to establish secure communication over insecure open networks and distributedsystems. In the first part of this paper the brief introduction to the analysisand design area is given, followed by the description of the author's presentedevolutionary approach, which seems to be useful for automating the security protocoldesign.

English abstract

The security protocols areused to establish secure communication over insecure open networks and distributedsystems. In the first part of this paper the brief introduction to the analysisand design area is given, followed by the description of the author's presentedevolutionary approach, which seems to be useful for automating the security protocoldesign.

Keywords

Security protocol, analysis, design, verification, genetic algorithm, evolutionary approach

Key words in English

Security protocol, analysis, design, verification, genetic algorithm, evolutionary approach

Authors

OČENÁŠEK, P.

Released

19.04.2006

Publisher

Technical University Wien

Location

Vienna

ISBN

3-902463-05-8

Book

Proceedings of the Junior Scientist Conference 2006

Pages from

51

Pages to

52

Pages count

2

BibTex

@inproceedings{BUT22184,
  author="Pavel {Očenášek}",
  title="Security Protocols: Analysis and Design",
  booktitle="Proceedings of the Junior Scientist Conference 2006",
  year="2006",
  pages="51--52",
  publisher="Technical University Wien",
  address="Vienna",
  isbn="3-902463-05-8"
}