Security Protocols: Analysis and Design
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F06%3APU66871" target="_blank" >RIV/00216305:26230/06:PU66871 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Security Protocols: Analysis and Design
Original language description
The security protocols are used to establish secure communication over insecure open networks and distributed systems. In the first part of this paper the brief introduction to the analysis and design area is given, followed by the description of the author's presented evolutionary approach, which seems to be useful for automating the security protocol design.
Czech name
Bezpečnostní protokoly: analýza a design
Czech description
Bezpečnostní protokoly: analýza a design.<br>
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
Result was created during the realization of more than one project. More information in the Projects tab.
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2006
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the Junior Scientists Conference 2006
ISBN
3-902463-05-8
ISSN
—
e-ISSN
—
Number of pages
2
Pages from-to
51-52
Publisher name
TU Vienna
Place of publication
Vienna
Event location
Vienna
Event date
Apr 19, 2006
Type of event by nationality
CST - Celostátní akce
UT code for WoS article
—