Evolutionary Approach in the Security Protocols Design
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F05%3APU56544" target="_blank" >RIV/00216305:26230/05:PU56544 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Evolutionary Approach in the Security Protocols Design
Original language description
This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the specification of modal logic that is used to encode the belief and knowledge of communicating parties. The second part introduces the evolutionary optimization framework and proposes the techniques that can be used to automatically evolve basic security protocols.
Czech name
Evoluční přístup při návrhu bezpečnostních protokolů
Czech description
Článek se zabývá problematikou automatizovaného designu bezpečnostních protokolů.
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
Result was created during the realization of more than one project. More information in the Projects tab.
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2005
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the First European Conference on Computer Network Defence
ISBN
1-84628-311-6
ISSN
—
e-ISSN
—
Number of pages
10
Pages from-to
147-156
Publisher name
Springer Verlag
Place of publication
University of Glamorgan
Event location
Pontypridd
Event date
Dec 15, 2005
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—