Publication detail

Analysis of Authentication Protocols with Scyter: Case Study

OČENÁŠEK, P.

Original Title

Analysis of Authentication Protocols with Scyter: Case Study

English Title

Analysis of Authentication Protocols with Scyter: Case Study

Type

conference paper

Language

en

Original Abstract

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

English abstract

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

Keywords

Analysis, authentication protocol, Scyter, case study

RIV year

2011

Released

02.03.2011

Publisher

Springer Verlag

Location

Berlin Heidelberg

ISBN

978-3-642-21792-0

Book

Human Interface and the Management of Information. Interacting with Information

Edition

Lecture Notes in Computer Science

Edition number

NEUVEDEN

Pages from

359

Pages to

365

Pages count

7

BibTex


@inproceedings{BUT76280,
  author="Pavel {Očenášek}",
  title="Analysis of Authentication Protocols with Scyter: Case Study",
  annote="The paper deals with the authentication protocol analysis using Scyter. The paper
also includes a case-study that shows the analysis process step-by-step.",
  address="Springer Verlag",
  booktitle="Human Interface and the Management of Information. Interacting with Information",
  chapter="76280",
  edition="Lecture Notes in Computer Science",
  howpublished="print",
  institution="Springer Verlag",
  year="2011",
  month="march",
  pages="359--365",
  publisher="Springer Verlag",
  type="conference paper"
}