Attributes | Values |
---|
rdf:type
| |
Description
| - Článek pojednává o modálních logikách používaných pro analýzu bezpečnostních protokolů.<br> (cs)
- Weaknesses in authentication protocols (AP) are hard to identify, as they can be the result of subtle design flaws. The formal verification of authentication protocols may be done in two ways. One possibility is to use a modal logic of authentication. The other possibility is to use general purpose formal methods. This paper provides a survey through the world of modal logics used in AP and gives a comparison of different variants of modal logics and their target areas of application.
- Weaknesses in authentication protocols (AP) are hard to identify, as they can be the result of subtle design flaws. The formal verification of authentication protocols may be done in two ways. One possibility is to use a modal logic of authentication. The other possibility is to use general purpose formal methods. This paper provides a survey through the world of modal logics used in AP and gives a comparison of different variants of modal logics and their target areas of application. (en)
|
Title
| - Modal Logics Used for Authentication Protocols Analysis: Survey and Comparison
- Modální logiky používané pro analýzu autentizačních protokolů: přehled a srovnání (cs)
- Modal Logics Used for Authentication Protocols Analysis: Survey and Comparison (en)
|
skos:prefLabel
| - Modal Logics Used for Authentication Protocols Analysis: Survey and Comparison
- Modální logiky používané pro analýzu autentizačních protokolů: přehled a srovnání (cs)
- Modal Logics Used for Authentication Protocols Analysis: Survey and Comparison (en)
|
skos:notation
| - RIV/00216305:26230/06:PU66869!RIV07-MSM-26230___
|
http://linked.open.../vavai/riv/strany
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| - P(GA102/05/0467), P(GA102/05/0723), P(GD102/05/H050), Z(MSM0021630503)
|
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26230/06:PU66869
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - authentication protocol, modal logic, design, verification (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the 7th International Carpathian Control Conference
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Očenášek, Pavel
- Trchalík, Roman
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Vysoká škola báňská - Technická univerzita Ostrava
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |