- Tytuł:
- Timed models of security protocols including delays in the network
- Autorzy:
-
Szymoniak, S.
Kurkowski, M.
Piątkowski, J. - Powiązania:
- https://bibliotekanauki.pl/articles/122609.pdf
- Data publikacji:
- 2015
- Wydawca:
- Politechnika Częstochowska. Wydawnictwo Politechniki Częstochowskiej
- Tematy:
-
computer science
mathematical models
informatyka
modele matematyczne - Opis:
- A very important part of the network and computer systems is to ensure an appropriate level of information transmission security. Security is based primarily on properly selected communication in security protocol. Unfortunately, the time-dependent protocols are vulnerable to attacks; therefore there is a need to verify these protocols. For verification purposes, protocols can be modeled using timed automata. During the modeling and verification of the protocols, one should also keep in mind delays in the network. So far, delays in the network were not modeled.
- Źródło:
-
Journal of Applied Mathematics and Computational Mechanics; 2015, 14, 3; 127-139
2299-9965 - Pojawia się w:
- Journal of Applied Mathematics and Computational Mechanics
- Dostawca treści:
- Biblioteka Nauki