Detail publikace

Analysis of Authentication Protocols with Scyter: Case Study

Originální název

Analysis of Authentication Protocols with Scyter: Case Study

Anglický název

Analysis of Authentication Protocols with Scyter: Case Study

Jazyk

en

Originální abstrakt

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

Anglický abstrakt

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

BibTex


@inproceedings{BUT76280,
  author="Pavel {Očenášek}",
  title="Analysis of Authentication Protocols with Scyter: Case Study",
  annote="The paper deals with the authentication protocol analysis using Scyter. The paper
also includes a case-study that shows the analysis process step-by-step.",
  address="Springer Verlag",
  booktitle="Human Interface and the Management of Information. Interacting with Information",
  chapter="76280",
  edition="Lecture Notes in Computer Science",
  howpublished="print",
  institution="Springer Verlag",
  year="2011",
  month="march",
  pages="359--365",
  publisher="Springer Verlag",
  type="conference paper"
}