Publication result detail

Specification of Traces in the Security Protocols Analysis

OČENÁŠEK, P.

Original Title

Specification of Traces in the Security Protocols Analysis

English Title

Specification of Traces in the Security Protocols Analysis

Type

Paper in proceedings outside WoS and Scopus

Original Abstract

The paper demonstrates the security protocol analysis with the step-by-step approach. The analysis is performed from each party's point of view and is followed with the operational analysis of message exchanges.

English abstract

The paper demonstrates the security protocol analysis with the step-by-step approach. The analysis is performed from each party's point of view and is followed with the operational analysis of message exchanges.

Keywords

Needham Schroeder, security protocol, analysis, verificaton.

Key words in English

Needham Schroeder, security protocol, analysis, verificaton.

Authors

OČENÁŠEK, P.

RIV year

2012

Released

01.12.2011

Publisher

Institute of Electrical and Electronics Engineers

Location

Dubrovnik

ISBN

978-953-7138-20-2

Book

Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES

Pages from

115

Pages to

118

Pages count

4

BibTex

@inproceedings{BUT76347,
  author="Pavel {Očenášek}",
  title="Specification of Traces in the Security Protocols Analysis",
  booktitle="Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES",
  year="2011",
  pages="115--118",
  publisher="Institute of Electrical and Electronics Engineers",
  address="Dubrovnik",
  isbn="978-953-7138-20-2"
}