Detail publikace

Analysis of Authentication Protocols with Scyter: Case Study

OČENÁŠEK, P.

Originální název

Analysis of Authentication Protocols with Scyter: Case Study

Typ

článek ve sborníku mimo WoS a Scopus

Jazyk

angličtina

Originální abstrakt

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

Klíčová slova

Analysis, authentication protocol, Scyter, case study

Autoři

OČENÁŠEK, P.

Rok RIV

2011

Vydáno

2. 3. 2011

Nakladatel

Springer Verlag

Místo

Berlin Heidelberg

ISBN

978-3-642-21792-0

Kniha

Human Interface and the Management of Information. Interacting with Information

Edice

Lecture Notes in Computer Science

Strany od

359

Strany do

365

Strany počet

7

BibTex

@inproceedings{BUT76280,
  author="Pavel {Očenášek}",
  title="Analysis of Authentication Protocols with Scyter: Case Study",
  booktitle="Human Interface and the Management of Information. Interacting with Information",
  year="2011",
  series="Lecture Notes in Computer Science",
  volume="6771",
  pages="359--365",
  publisher="Springer Verlag",
  address="Berlin Heidelberg",
  isbn="978-3-642-21792-0"
}