Přístupnostní navigace
E-application
Search Search Close
Publication detail
OČENÁŠEK, P.
Original Title
Verifikace bezpečnostních protokolů
English Title
Verification of Security Protocols
Type
article in a collection out of WoS and Scopus
Language
Czech
Original Abstract
Práce se zabývá analýzou metod používaných k verifikaci bezpečnostních protokolů.
English abstract
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitutes a flaw. The paper attempts to draw some general lessons on the use of formalism. It outlines the problem area, emphasizing the notion of freshness. It describes how a protocol can be specified using several formal methods.
Keywords
formální verifikace, bezpečnostní protokoly
Key words in English
formal verification, security protocols
Authors
RIV year
2004
Released
24. 4. 2003
Publisher
Fakulta elektrotechniky a komunikačních technologií VUT v Brně
Location
Brno
ISBN
80-214-2377-3
Book
Proceedings of the 9th Conference and Competition STUDENT EEICT 2003
Pages from
211
Pages to
213
Pages count
3
BibTex
@inproceedings{BUT14207, author="Pavel {Očenášek}", title="Verifikace bezpečnostních protokolů", booktitle="Proceedings of the 9th Conference and Competition STUDENT EEICT 2003", year="2003", pages="211--213", publisher="Fakulta elektrotechniky a komunikačních technologií VUT v Brně", address="Brno", isbn="80-214-2377-3" }