Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Formal methods of analysis of security protocols

In: Tatra Mountains Mathematical Publications, vol. 25, no. 3
Eva Jenčušová - Jozef Jirásek
Detaily:
Rok, strany: 2002, 1 - 10
O článku:
In time of internet attacks it is important to use security and cryptographic protocols to secure private data that are sent via Internet. But using of such protocol is not enough. To really secure our data we must know that the used protocol is really secure. For this purpose a lot of methods were designed. The article presents new DLA method (Database and Logic Abduction) that is based on combination of datalog and logic abduction theory. This method is used to find out whether a security or cryptographic protocol satisfies security properties.
Ako citovať:
ISO 690:
Jenčušová, E., Jirásek, J. 2002. Formal methods of analysis of security protocols. In Tatra Mountains Mathematical Publications, vol. 25, no.3, pp. 1-10. 1210-3195.

APA:
Jenčušová, E., Jirásek, J. (2002). Formal methods of analysis of security protocols. Tatra Mountains Mathematical Publications, 25(3), 1-10. 1210-3195.