Title :
Specification of traces in the security protocols analysis
Author_Institution :
Fac. of Inf. Technol., Brno Univ. of Technol., Brno, Czech Republic
Abstract :
The paper demonstrates the security protocol analysis with the step-by-step approach. The analysis is performed from each party´s point of view and is followed with the operational analysis of message exchanges.
Keywords :
cryptographic protocols; formal specification; message exchanges; security protocols analysis; step-by-step approach; Needham Schroeder; analysis; security protocol; verificaton;
Conference_Titel :
Information Technology Interfaces (ITI), Proceedings of the ITI 2011 33rd International Conference on
Conference_Location :
Dubrovnik
Print_ISBN :
978-1-61284-897-6
Electronic_ISBN :
1330-1012