Publication result detail

Analysis of Authentication Protocols with Scyter: Case Study

OČENÁŠEK, P.

Original Title

Analysis of Authentication Protocols with Scyter: Case Study

English Title

Analysis of Authentication Protocols with Scyter: Case Study

Type

Paper in proceedings outside WoS and Scopus

Original Abstract

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

English abstract

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

Keywords

Analysis, authentication protocol, Scyter, case study

Key words in English

Analysis, authentication protocol, Scyter, case study

Authors

OČENÁŠEK, P.

RIV year

2012

Released

02.03.2011

Publisher

Springer Verlag

Location

Berlin Heidelberg

ISBN

978-3-642-21792-0

Book

Human Interface and the Management of Information. Interacting with Information

Edition

Lecture Notes in Computer Science

Volume

6771

Pages from

359

Pages to

365

Pages count

7

BibTex

@inproceedings{BUT76280,
  author="Pavel {Očenášek}",
  title="Analysis of Authentication Protocols with Scyter: Case Study",
  booktitle="Human Interface and the Management of Information. Interacting with Information",
  year="2011",
  series="Lecture Notes in Computer Science",
  volume="6771",
  pages="359--365",
  publisher="Springer Verlag",
  address="Berlin Heidelberg",
  isbn="978-3-642-21792-0"
}