Detail publikace

Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae

Originální název

Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae

Anglický název

Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae

Jazyk

en

Originální abstrakt

The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This paper deals with the concept of design of such protocols and their properties. The paper starts with the properties and requirements of designed protocol, followed by the description of the design concept based on the trace formula and the process of its automation within the design library. The presented library supports both the handling of protocol properties and protocol design. The paper concludes with some examples of generated protocols.

Anglický abstrakt

The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This paper deals with the concept of design of such protocols and their properties. The paper starts with the properties and requirements of designed protocol, followed by the description of the design concept based on the trace formula and the process of its automation within the design library. The presented library supports both the handling of protocol properties and protocol design. The paper concludes with some examples of generated protocols.

BibTex


@article{BUT96967,
  author="Pavel {Očenášek} and Luboš {Míchal}",
  title="Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae",
  annote="The security protocols are widely used for providing safe communication. They are
used for creating private communication channels in unsecured area. This paper
deals with the concept of design of such protocols and their properties. The
paper starts with the properties and requirements of designed protocol, followed
by the description of the design concept based on the trace formula and the
process of its automation within the design library. The presented library
supports both the handling of protocol properties and protocol design. The paper
concludes with some examples of generated protocols.",
  address="NEUVEDEN",
  chapter="96967",
  edition="NEUVEDEN",
  howpublished="online",
  institution="NEUVEDEN",
  number="157",
  volume="2012",
  year="2012",
  month="february",
  pages="870--873",
  publisher="NEUVEDEN",
  type="journal article - other"
}