Publication detail
Designing Secure Communications Using Evolutionary Approach
OČENÁŠEK, P. OČENÁŠEK, J.
Original Title
Designing Secure Communications Using Evolutionary Approach
English Title
Designing Secure Communications Using Evolutionary Approach
Type
conference paper
Language
en
Original Abstract
This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the outline of the evolutionary optimization framework and the techniques that can be used to automatically evolve basic security protocols.
English abstract
This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the outline of the evolutionary optimization framework and the techniques that can be used to automatically evolve basic security protocols.
Keywords
Security Protocols, Authentication, Communication, Design, Verification
RIV year
2006
Released
08.07.2006
Publisher
Association for Computing Machinery
Location
Seattle, WA
Pages from
1
Pages to
3
Pages count
3
Documents
BibTex
@inproceedings{BUT22199,
author="Pavel {Očenášek} and Jiří {Očenášek}",
title="Designing Secure Communications Using Evolutionary Approach",
annote="This paper proposes an evolutionary method that serves for designing security
protocols. The principles of security protocols are outlined, followed by the
outline of the evolutionary optimization framework and the techniques that can be
used to automatically evolve basic security protocols.",
address="Association for Computing Machinery",
booktitle="Genetic and Evolutionary Computation Conference GECCO 2006",
chapter="22199",
institution="Association for Computing Machinery",
year="2006",
month="july",
pages="1--0",
publisher="Association for Computing Machinery",
type="conference paper"
}