Publication detail

Tools for Analysis and Simulation of Protocol Communication

OČENÁŠEK, P.

Original Title

Tools for Analysis and Simulation of Protocol Communication

English Title

Tools for Analysis and Simulation of Protocol Communication

Type

conference paper

Language

en

Original Abstract

This paper deals with the tools used for analysis of communication protocols. It is focused particularly on the area of security protocols. In the first part the introduction to the analysis and formal methods is given, followed by the description of the tools available in the area of network protocols. Above the state of the art presentation, the comparison of presented tools is given along with their characteristics for the use with security protocols. The final part of the paper summarizes the advantages and disadvantages of different principles that are used in the presented tools.

English abstract

This paper deals with the tools used for analysis of communication protocols. It is focused particularly on the area of security protocols. In the first part the introduction to the analysis and formal methods is given, followed by the description of the tools available in the area of network protocols. Above the state of the art presentation, the comparison of presented tools is given along with their characteristics for the use with security protocols. The final part of the paper summarizes the advantages and disadvantages of different principles that are used in the presented tools.

Keywords

Network, Tools, Protocol, Communication

RIV year

2007

Released

20.09.2007

Publisher

Brno University of Technology

Location

Brno

ISBN

978-80-214-3470-7

Book

EDS '07 IMAPS CS International Conference Proceedings

Pages from

87

Pages to

91

Pages count

5

BibTex


@inproceedings{BUT28810,
  author="Pavel {Očenášek}",
  title="Tools for Analysis and Simulation of Protocol Communication",
  annote="This paper deals with the tools used for analysis of communication protocols. It
is focused particularly on the area of security protocols. In the first part the
introduction to the analysis and formal methods is given, followed by the
description of the tools available in the area of network protocols. Above the
state of the art presentation, the comparison of presented tools is given along
with their characteristics for the use with security protocols. The final part of
the paper summarizes the advantages and disadvantages of different principles
that are used in the presented tools.",
  address="Brno University of Technology",
  booktitle="EDS '07 IMAPS CS International Conference Proceedings",
  chapter="28810",
  howpublished="print",
  institution="Brno University of Technology",
  year="2007",
  month="september",
  pages="87--91",
  publisher="Brno University of Technology",
  type="conference paper"
}