Publication Details

Analysis of Authentication Protocols with Scyter: Case Study

OČENÁŠEK, P. Analysis of Authentication Protocols with Scyter: Case Study. Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011. p. 359-365. ISBN: 978-3-642-21792-0.
Czech title
Analýza autentizačních protokolů pomocí Scyter: případová studie
Type
conference paper
Language
English
Authors
Keywords

Analysis, authentication protocol, Scyter, case study

Abstract

The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.

Published
2011
Pages
359–365
Proceedings
Human Interface and the Management of Information. Interacting with Information
Series
Lecture Notes in Computer Science
Volume
6771
ISBN
978-3-642-21792-0
Publisher
Springer Verlag
Place
Berlin Heidelberg
BibTeX
@inproceedings{BUT76280,
  author="Pavel {Očenášek}",
  title="Analysis of Authentication Protocols with Scyter: Case Study",
  booktitle="Human Interface and the Management of Information. Interacting with Information",
  year="2011",
  series="Lecture Notes in Computer Science",
  volume="6771",
  pages="359--365",
  publisher="Springer Verlag",
  address="Berlin Heidelberg",
  isbn="978-3-642-21792-0"
}
Back to top