Detail publikace

Tools for Analysis and Simulation of Protocol Communication

Originální název

Tools for Analysis and Simulation of Protocol Communication

Anglický název

Tools for Analysis and Simulation of Protocol Communication

Jazyk

en

Originální abstrakt

This paper deals with the tools used for analysis of communication protocols. It is focused particularly on the area of security protocols. In the first part the introduction to the analysis and formal methods is given, followed by the description of the tools available in the area of network protocols. Above the state of the art presentation, the comparison of presented tools is given along with their characteristics for the use with security protocols. The final part of the paper summarizes the advantages and disadvantages of different principles that are used in the presented tools.

Anglický abstrakt

This paper deals with the tools used for analysis of communication protocols. It is focused particularly on the area of security protocols. In the first part the introduction to the analysis and formal methods is given, followed by the description of the tools available in the area of network protocols. Above the state of the art presentation, the comparison of presented tools is given along with their characteristics for the use with security protocols. The final part of the paper summarizes the advantages and disadvantages of different principles that are used in the presented tools.

BibTex


@inproceedings{BUT28810,
  author="Pavel {Očenášek}",
  title="Tools for Analysis and Simulation of Protocol Communication",
  annote="This paper deals with the tools used for analysis of communication protocols. It
is focused particularly on the area of security protocols. In the first part the
introduction to the analysis and formal methods is given, followed by the
description of the tools available in the area of network protocols. Above the
state of the art presentation, the comparison of presented tools is given along
with their characteristics for the use with security protocols. The final part of
the paper summarizes the advantages and disadvantages of different principles
that are used in the presented tools.",
  address="Brno University of Technology",
  booktitle="EDS '07 IMAPS CS International Conference Proceedings",
  chapter="28810",
  howpublished="print",
  institution="Brno University of Technology",
  year="2007",
  month="september",
  pages="87--91",
  publisher="Brno University of Technology",
  type="conference paper"
}