Publication detail

Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae

OČENÁŠEK, P. MÍCHAL, L.

Original Title

Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae

English Title

Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae

Type

conference paper

Language

en

Original Abstract

The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This paper deals with the concept of design of such protocols and their properties. The paper starts with the properties and requirements of designed protocol, followed by the description of the design concept based on the trace formula and the process of its automation within the design library. The presented library supports both the handling of protocol properties and protocol design. The paper concludes with some examples of generated protocols.

English abstract

The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This paper deals with the concept of design of such protocols and their properties. The paper starts with the properties and requirements of designed protocol, followed by the description of the design concept based on the trace formula and the process of its automation within the design library. The presented library supports both the handling of protocol properties and protocol design. The paper concludes with some examples of generated protocols.

Keywords

Authentication Scheme, Key Distribution Scheme, Trace Formulae, Design, Automation

RIV year

2011

Released

16.03.2012

Publisher

Trans Tech Publications Inc.

Location

Hongkong

ISBN

978-3-03785-380-1

Book

Proceedings of 2011 International Conference on Mechatronics and Applied Mechanics (ICMAM 2011)

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

870

Pages to

873

Pages count

4

BibTex


@inproceedings{BUT91116,
  author="Pavel {Očenášek} and Luboš {Míchal}",
  title="Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae",
  annote="The security protocols are widely used for providing safe communication. They are
used for creating private communication channels in unsecured area. This paper
deals with the concept of design of such protocols and their properties. The
paper starts with the properties and requirements of designed protocol, followed
by the description of the design concept based on the trace formula and the
process of its automation within the design library. The presented library
supports both the handling of protocol properties and protocol design. The paper
concludes with some examples of generated protocols.",
  address="Trans Tech Publications Inc.",
  booktitle="Proceedings of 2011 International Conference on Mechatronics and Applied Mechanics (ICMAM 2011)",
  chapter="91116",
  doi="10.4028/www.scientific.net/AMM.157-158.870",
  edition="NEUVEDEN",
  howpublished="electronic, physical medium",
  institution="Trans Tech Publications Inc.",
  number="03",
  year="2012",
  month="march",
  pages="870--873",
  publisher="Trans Tech Publications Inc.",
  type="conference paper"
}