Attributes | Values |
---|
rdf:type
| |
Description
| - Tento příspěvek pojednává o evolučním přístupu při návrhu bezpečnostních protokolů. (cs)
- This paper deals with the evolutionary approach for designing security protocols. In the first part, the introduction to security protocols is outlined followed by the explanation of principles of genetic algorithms. The second part presents the algorithm for designing security protocols. The whole design is determined by the genetic evolution. The genetic approach must be connected with the heuristic strategies to satisfy some design expectations. In the addition to the previous work, the idea of autommatic designing tool and other directions in the topics research are outlined. The paper relates closely to the topic of the author's PhD thesis.
- This paper deals with the evolutionary approach for designing security protocols. In the first part, the introduction to security protocols is outlined followed by the explanation of principles of genetic algorithms. The second part presents the algorithm for designing security protocols. The whole design is determined by the genetic evolution. The genetic approach must be connected with the heuristic strategies to satisfy some design expectations. In the addition to the previous work, the idea of autommatic designing tool and other directions in the topics research are outlined. The paper relates closely to the topic of the author's PhD thesis. (en)
|
Title
| - The Security Protocol Design Using Genetic Algorithms Paradigms
- Návrh bezpečnostních protokolů za použití principů genetických algoritmů (cs)
- The Security Protocol Design Using Genetic Algorithms Paradigms (en)
|
skos:prefLabel
| - The Security Protocol Design Using Genetic Algorithms Paradigms
- Návrh bezpečnostních protokolů za použití principů genetických algoritmů (cs)
- The Security Protocol Design Using Genetic Algorithms Paradigms (en)
|
skos:notation
| - RIV/00216305:26230/05:PU55705!RIV06-GA0-26230___
|
http://linked.open.../vavai/riv/strany
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| - P(GA102/05/0467), P(GA102/05/0723)
|
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26230/05:PU55705
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - security protocol, design, genetic algorithm, evolutionary approach, verification, formal specification, BAN logic (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the 11th Conference and Competition STUDENT EEICT 2005
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |