Return to search

Databáze specifikací bezpečnostních protokolů / Specifications Database of Security Protocols

Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.

Identiferoai:union.ndltd.org:nusl.cz/oai:invenio.nusl.cz:235438
Date January 2008
CreatorsOndráček, David
ContributorsTrchalík, Roman, Očenášek, Pavel
PublisherVysoké učení technické v Brně. Fakulta informačních technologií
Source SetsCzech ETDs
LanguageCzech
Detected LanguageEnglish
Typeinfo:eu-repo/semantics/masterThesis
Rightsinfo:eu-repo/semantics/restrictedAccess

Page generated in 0.0018 seconds