Detail publikace
Tools for Analysis and Simulation of Protocol Communication
OČENÁŠEK, P.
Originální název
Tools for Analysis and Simulation of Protocol Communication
Anglický název
Tools for Analysis and Simulation of Protocol Communication
Jazyk
en
Originální abstrakt
This paper deals with the tools used for analysis of communication protocols. It is focused particularly on the area of security protocols. In the first part the introduction to the analysis and formal methods is given, followed by the description of the tools available in the area of network protocols. Above the state of the art presentation, the comparison of presented tools is given along with their characteristics for the use with security protocols. The final part of the paper summarizes the advantages and disadvantages of different principles that are used in the presented tools.
Anglický abstrakt
This paper deals with the tools used for analysis of communication protocols. It is focused particularly on the area of security protocols. In the first part the introduction to the analysis and formal methods is given, followed by the description of the tools available in the area of network protocols. Above the state of the art presentation, the comparison of presented tools is given along with their characteristics for the use with security protocols. The final part of the paper summarizes the advantages and disadvantages of different principles that are used in the presented tools.
Dokumenty
BibTex
@inproceedings{BUT28810,
author="Pavel {Očenášek}",
title="Tools for Analysis and Simulation of Protocol Communication",
annote="This paper deals with the tools used for analysis of communication protocols. It
is focused particularly on the area of security protocols. In the first part the
introduction to the analysis and formal methods is given, followed by the
description of the tools available in the area of network protocols. Above the
state of the art presentation, the comparison of presented tools is given along
with their characteristics for the use with security protocols. The final part of
the paper summarizes the advantages and disadvantages of different principles
that are used in the presented tools.",
address="Brno University of Technology",
booktitle="EDS '07 IMAPS CS International Conference Proceedings",
chapter="28810",
howpublished="print",
institution="Brno University of Technology",
year="2007",
month="september",
pages="87--91",
publisher="Brno University of Technology",
type="conference paper"
}