Detail publikace
An Approach for the Design of Secure Communication in Embedded Systems
OČENÁŠEK, P.
Originální název
An Approach for the Design of Secure Communication in Embedded Systems
Anglický název
An Approach for the Design of Secure Communication in Embedded Systems
Jazyk
en
Originální abstrakt
This paper deals with the novel evolutionary approach used for the automatic design of security protocols that also employs the novel grammatical generation of protocols according to the design and security requirements. The first part outlines the introduces security protocols Then, in the main part of this paper, we propose the new algorithm based on natural evolution that is utilized for the automated design of secure communication and security protocols. These protocols may be used for authentication, key distribution and/or for providing other security functions and properties.
Anglický abstrakt
This paper deals with the novel evolutionary approach used for the automatic design of security protocols that also employs the novel grammatical generation of protocols according to the design and security requirements. The first part outlines the introduces security protocols Then, in the main part of this paper, we propose the new algorithm based on natural evolution that is utilized for the automated design of secure communication and security protocols. These protocols may be used for authentication, key distribution and/or for providing other security functions and properties.
Dokumenty
BibTex
@inproceedings{BUT34280,
author="Pavel {Očenášek}",
title="An Approach for the Design of Secure Communication in Embedded Systems",
annote="This paper deals with the novel evolutionary approach used for the automatic
design of security protocols that also employs the novel grammatical generation
of protocols according to the design and security requirements. The first part
outlines the introduces security protocols Then, in the main part of this paper,
we propose the new algorithm based on natural evolution that is utilized for the
automated design of secure communication and security protocols. These protocols
may be used for authentication, key distribution and/or for providing other
security functions and properties.",
address="Springer Verlag",
booktitle="Human Interface and the Management of Information. Designing Information Environments",
chapter="34280",
edition="Lecture Notes in Computer Science",
howpublished="print",
institution="Springer Verlag",
journal="Lecture Notes in Computer Science (IF 0,513)",
year="2009",
month="july",
pages="579--586",
publisher="Springer Verlag",
type="conference paper"
}