Detail publikace

An Approach for the Design of Secure Communication in Embedded Systems

Originální název

An Approach for the Design of Secure Communication in Embedded Systems

Anglický název

An Approach for the Design of Secure Communication in Embedded Systems

Jazyk

en

Originální abstrakt

This paper deals with the novel evolutionary approach used for the automatic design of security protocols that also employs the novel grammatical generation of protocols according to the design and security requirements. The first part outlines the introduces security protocols Then, in the main part of this paper, we propose the new algorithm based on natural evolution that is utilized for the automated design of secure communication and security protocols. These protocols may be used for authentication, key distribution and/or for providing other security functions and properties.

Anglický abstrakt

This paper deals with the novel evolutionary approach used for the automatic design of security protocols that also employs the novel grammatical generation of protocols according to the design and security requirements. The first part outlines the introduces security protocols Then, in the main part of this paper, we propose the new algorithm based on natural evolution that is utilized for the automated design of secure communication and security protocols. These protocols may be used for authentication, key distribution and/or for providing other security functions and properties.

BibTex


@inproceedings{BUT34280,
  author="Pavel {Očenášek}",
  title="An Approach for the Design of Secure Communication in Embedded Systems",
  annote="This paper deals with the novel evolutionary approach used for the automatic
design of security protocols that also employs the novel grammatical generation
of protocols according to the design and security requirements. The first part
outlines the introduces security protocols Then, in the main part of this paper,
we propose the new algorithm based on natural evolution that is utilized for the
automated design of secure communication and security protocols. These protocols
may be used for authentication, key distribution and/or for providing other
security functions and properties.",
  address="Springer Verlag",
  booktitle="Human Interface and the Management of Information. Designing Information Environments",
  chapter="34280",
  edition="Lecture Notes in Computer Science",
  howpublished="print",
  institution="Springer Verlag",
  journal="Lecture Notes in Computer Science (IF 0,513)",
  year="2009",
  month="july",
  pages="579--586",
  publisher="Springer Verlag",
  type="conference paper"
}