Detail publikačního výsledku

The Use of Modal Logics in the Security Protocols Analysis

OČENÁŠEK, P.; TRCHALÍK, R.

Originální název

The Use of Modal Logics in the Security Protocols Analysis

Anglický název

The Use of Modal Logics in the Security Protocols Analysis

Druh

Stať ve sborníku mimo WoS a Scopus

Originální abstrakt

Traditionally, security protocols have beendesigned and verified using various techniques. Formal logics have been used toidentify a number of flaws in protocols previously considered to be secure. Theselection of proper modal logic is a crucial goal in the protocol analysisprocess. This paper gives a comparative study of modal logics, which are widelyused in modeling of security protocols.

Anglický abstrakt

Traditionally, security protocols have beendesigned and verified using various techniques. Formal logics have been used toidentify a number of flaws in protocols previously considered to be secure. Theselection of proper modal logic is a crucial goal in the protocol analysisprocess. This paper gives a comparative study of modal logics, which are widelyused in modeling of security protocols.

Klíčová slova

Modal Logic, Security Protocol, Analysis

Klíčová slova v angličtině

Modal Logic, Security Protocol, Analysis

Autoři

OČENÁŠEK, P.; TRCHALÍK, R.

Vydáno

27.04.2006

Nakladatel

Faculty of Electrical Engineering and Communication BUT

Místo

Brno

ISBN

80-214-3163-6

Kniha

Proceedings of the 12th Conference STUDENT EEICT 2006

Strany od

395

Strany do

399

Strany počet

5

Plný text v Digitální knihovně

BibTex

@inproceedings{BUT22192,
  author="Pavel {Očenášek} and Roman {Trchalík}",
  title="The Use of Modal Logics in the Security Protocols Analysis",
  booktitle="Proceedings of the 12th Conference STUDENT EEICT 2006",
  year="2006",
  pages="395--399",
  publisher="Faculty of Electrical Engineering and Communication BUT",
  address="Brno",
  isbn="80-214-3163-6"
}