Publication Details

Využití stromových automatů při verifikaci bezpečnostních protokolů

OČENÁŠEK Pavel. Využití stromových automatů při verifikaci bezpečnostních protokolů. Brno: Department of Information Systems FIT BUT, 2004.
English title
The Use of Tree-Automata in the Security Protocol Verification
Type
report
Language
czech
Authors
URL
Keywords

Tree Automata, Security Protocol, Verification

Abstract

Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitutes a flaw. The paper attempts to draw an approach based on the use of tree automata.

Published
2004
Pages
17
Publisher
Department of Information Systems FIT BUT
Place
Brno, CZ
BibTeX
@TECHREPORT{FITPUB8264,
   author = "Pavel O\v{c}en\'{a}\v{s}ek",
   title = "Vyu\v{z}it\'{i} stromov\'{y}ch automat\r{u} p\v{r}i verifikaci bezpe\v{c}nostn\'{i}ch protokol\r{u}",
   pages = 17,
   year = 2004,
   location = "Brno, CZ",
   publisher = "Department of Information Systems FIT BUT",
   language = "czech",
   url = "https://www.fit.vut.cz/research/publication/8264"
}
Back to top