- Tytuł:
- Using probabilistic automata for security protocols verification
- Autorzy:
-
Siedlecka-Lamch, O.
Kurkowski, M.
Piątkowski, J. - Powiązania:
- https://bibliotekanauki.pl/articles/122825.pdf
- Data publikacji:
- 2016
- Wydawca:
- Politechnika Częstochowska. Wydawnictwo Politechniki Częstochowskiej
- Tematy:
-
verification of security protocols
probabilistic methods
weryfikacja protokołów bezpieczeństwa
metody probabilistyczne
protokoły uwierzytelniania - Opis:
- The article discusses the issues of modeling and the analysis of executions, which is a substantial part of modern communication protocols - authentication protocols, which are generally referred to herein as security protocols. The article presents a way of security protocols executions analysis with the use of probabilistic automata, without well known and widely used perfect cryptography assumption (we assume allowing the possibility of breaking a key with a specified probability). This type of analysis leads to interesting observations about the operation of the protocol and its weaknesses.
- Źródło:
-
Journal of Applied Mathematics and Computational Mechanics; 2016, 15, 2; 119-125
2299-9965 - Pojawia się w:
- Journal of Applied Mathematics and Computational Mechanics
- Dostawca treści:
- Biblioteka Nauki