Publication detail

Specification of Traces in the Security Protocols Analysis

OČENÁŠEK, P.

Original Title

Specification of Traces in the Security Protocols Analysis

English Title

Specification of Traces in the Security Protocols Analysis

Type

conference paper

Language

en

Original Abstract

The paper demonstrates the security protocol analysis with the step-by-step approach. The analysis is performed from each party's point of view and is followed with the operational analysis of message exchanges.

English abstract

The paper demonstrates the security protocol analysis with the step-by-step approach. The analysis is performed from each party's point of view and is followed with the operational analysis of message exchanges.

Keywords

Needham Schroeder, security protocol, analysis, verificaton.

RIV year

2011

Released

01.12.2011

Publisher

Institute of Electrical and Electronics Engineers

Location

Dubrovnik

ISBN

978-953-7138-20-2

Book

Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

115

Pages to

118

Pages count

4

Documents

BibTex


@inproceedings{BUT76347,
  author="Pavel {Očenášek}",
  title="Specification of Traces in the Security Protocols Analysis",
  annote="The paper demonstrates the security protocol analysis with the step-by-step
approach. The analysis is performed from each party's point of view and is
followed with the operational analysis of message exchanges.",
  address="Institute of Electrical and Electronics Engineers",
  booktitle="Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES",
  chapter="76347",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Institute of Electrical and Electronics Engineers",
  year="2011",
  month="december",
  pages="115--118",
  publisher="Institute of Electrical and Electronics Engineers",
  type="conference paper"
}