Publication detail

Security Protocols: Analysis and Design

OČENÁŠEK, P.

Original Title

Security Protocols: Analysis and Design

English Title

Security Protocols: Analysis and Design

Type

conference paper

Language

en

Original Abstract

The security protocols are used to establish secure communication over insecure open networks and distributed systems. In the first part of this paper the brief introduction to the analysis and design area is given, followed by the description of the author’s presented evolutionary approach, which seems to be useful for automating the security protocol design.

English abstract

The security protocols are used to establish secure communication over insecure open networks and distributed systems. In the first part of this paper the brief introduction to the analysis and design area is given, followed by the description of the author’s presented evolutionary approach, which seems to be useful for automating the security protocol design.

Keywords

Security protocol, analysis, design, verification, genetic algorithm, evolutionary approach

RIV year

2006

Released

19.04.2006

Publisher

TU Vienna

Location

Vienna

ISBN

3-902463-05-8

Book

Proceedings of the Junior Scientist Conference 2006

Pages from

51

Pages to

52

Pages count

2

BibTex


@inproceedings{BUT22184,
  author="Pavel {Očenášek}",
  title="Security Protocols: Analysis and Design",
  annote="The security protocols are used to establish secure communication over insecure
open networks and distributed systems. In the first part of this paper the brief
introduction to the analysis and design area is given, followed by the
description of the author’s presented evolutionary approach, which seems to
be useful for automating the security protocol design.",
  address="TU Vienna",
  booktitle="Proceedings of the Junior Scientist Conference 2006",
  chapter="22184",
  institution="TU Vienna",
  year="2006",
  month="april",
  pages="51--52",
  publisher="TU Vienna",
  type="conference paper"
}