Publication detail

Designing Secure Communications Using Evolutionary Approach

OČENÁŠEK, P. OČENÁŠEK, J.

Original Title

Designing Secure Communications Using Evolutionary Approach

English Title

Designing Secure Communications Using Evolutionary Approach

Type

conference paper

Language

en

Original Abstract

This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the outline of the evolutionary optimization framework and the techniques that can be used to automatically evolve basic security protocols.

English abstract

This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the outline of the evolutionary optimization framework and the techniques that can be used to automatically evolve basic security protocols.

Keywords

Security Protocols, Authentication, Communication, Design, Verification

RIV year

2006

Released

08.07.2006

Publisher

Association for Computing Machinery

Location

Seattle, WA

Pages from

1

Pages to

3

Pages count

3

BibTex


@inproceedings{BUT22199,
  author="Pavel {Očenášek} and Jiří {Očenášek}",
  title="Designing Secure Communications Using Evolutionary Approach",
  annote="This paper proposes an evolutionary method that serves for designing security
protocols. The principles of security protocols are outlined, followed by the
outline of the evolutionary optimization framework and the techniques that can be
used to automatically evolve basic security protocols.",
  address="Association for Computing Machinery",
  booktitle="Genetic and Evolutionary Computation Conference GECCO 2006",
  chapter="22199",
  institution="Association for Computing Machinery",
  year="2006",
  month="july",
  pages="1--0",
  publisher="Association for Computing Machinery",
  type="conference paper"
}