Attributes | Values |
---|
rdf:type
| |
Description
| - Traditionally, security protocols have been designed and verified using various techniques. Formal logics have been used to identify a number of flaws in protocols previously considered to be secure. The selection of proper modal logic is a crucial goal in the protocol analysis process. This paper gives a comparative study of modal logics, which are widely used in modeling of security protocols.
- Traditionally, security protocols have been designed and verified using various techniques. Formal logics have been used to identify a number of flaws in protocols previously considered to be secure. The selection of proper modal logic is a crucial goal in the protocol analysis process. This paper gives a comparative study of modal logics, which are widely used in modeling of security protocols. (en)
- Práce se zabývá použitím modálních logik při analýze bezpečnostních protokolů.<br> (cs)
|
Title
| - The Use of Modal Logics in the Security Protocols Analysis
- The Use of Modal Logics in the Security Protocols Analysis (en)
- Použití modálních logik při analýze bezepčnostních protokolů (cs)
|
skos:prefLabel
| - The Use of Modal Logics in the Security Protocols Analysis
- The Use of Modal Logics in the Security Protocols Analysis (en)
- Použití modálních logik při analýze bezepčnostních protokolů (cs)
|
skos:notation
| - RIV/00216305:26230/06:PU66880!RIV07-MSM-26230___
|
http://linked.open.../vavai/riv/strany
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| - P(GA102/05/0467), P(GA102/05/0723), P(GD102/05/H050), Z(MSM0021630503)
|
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26230/06:PU66880
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Modal Logic, Security Protocol, Analysis<br> (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the 12th Conference STUDENT EEICT 2006
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Očenášek, Pavel
- Trchalík, Roman
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |