An Approach for Security Protocol Design Based on Zero-knowledge Primitives Composition
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F11%3APU95983" target="_blank" >RIV/00216305:26230/11:PU95983 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
An Approach for Security Protocol Design Based on Zero-knowledge Primitives Composition
Original language description
The paper deals with automated methods for the design of security protocols and their design using zero knowledge protocols, or protocols, where it is possible to use zero knowledge protocols such as subprotocols.. Specific emphasis is placed on the useof compositional method. The paper also include the example of protocol design.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
—
Continuities
Z - Vyzkumny zamer (s odkazem do CEZ)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2011
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Human Interface and the Management of Information. Interacting with Information
ISBN
978-3-642-21792-0
ISSN
—
e-ISSN
—
Number of pages
5
Pages from-to
374-378
Publisher name
Springer Verlag
Place of publication
Berlin Heidelberg
Event location
Orlando
Event date
Jul 9, 2011
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—