Publication detail
Analysis of Authentication Protocols with Scyter: Case Study
OČENÁŠEK, P.
Original Title
Analysis of Authentication Protocols with Scyter: Case Study
English Title
Analysis of Authentication Protocols with Scyter: Case Study
Type
conference paper
Language
en
Original Abstract
The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.
English abstract
The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.
Keywords
Analysis, authentication protocol, Scyter, case study
RIV year
2011
Released
02.03.2011
Publisher
Springer Verlag
Location
Berlin Heidelberg
ISBN
978-3-642-21792-0
Book
Human Interface and the Management of Information. Interacting with Information
Edition
Lecture Notes in Computer Science
Edition number
NEUVEDEN
Pages from
359
Pages to
365
Pages count
7
Documents
BibTex
@inproceedings{BUT76280,
author="Pavel {Očenášek}",
title="Analysis of Authentication Protocols with Scyter: Case Study",
annote="The paper deals with the authentication protocol analysis using Scyter. The paper
also includes a case-study that shows the analysis process step-by-step.",
address="Springer Verlag",
booktitle="Human Interface and the Management of Information. Interacting with Information",
chapter="76280",
edition="Lecture Notes in Computer Science",
howpublished="print",
institution="Springer Verlag",
year="2011",
month="march",
pages="359--365",
publisher="Springer Verlag",
type="conference paper"
}