This HTML5 document contains 49 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n22http://localhost/temp/predkladatel/
n15http://purl.org/net/nknouf/ns/bibtex#
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n9http://linked.opendata.cz/resource/domain/vavai/projekt/
n11http://linked.opendata.cz/ontology/domain/vavai/
n21http://linked.opendata.cz/resource/domain/vavai/zamer/
n18https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n7http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F06%3APU66880%21RIV07-MSM-26230___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n17http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n4http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F06%3APU66880%21RIV07-MSM-26230___
rdf:type
n11:Vysledek skos:Concept
dcterms:description
Traditionally, security protocols have been designed and verified using various techniques. Formal logics have been used to identify a number of flaws in protocols previously considered to be secure. The selection of proper modal logic is a crucial goal in the protocol analysis process. This paper gives a comparative study of modal logics, which are widely used in modeling of security protocols. Traditionally, security protocols have been designed and verified using various techniques. Formal logics have been used to identify a number of flaws in protocols previously considered to be secure. The selection of proper modal logic is a crucial goal in the protocol analysis process. This paper gives a comparative study of modal logics, which are widely used in modeling of security protocols. Práce se zabývá použitím modálních logik při analýze bezpečnostních protokolů.<br>
dcterms:title
The Use of Modal Logics in the Security Protocols Analysis The Use of Modal Logics in the Security Protocols Analysis Použití modálních logik při analýze bezepčnostních protokolů
skos:prefLabel
The Use of Modal Logics in the Security Protocols Analysis Použití modálních logik při analýze bezepčnostních protokolů The Use of Modal Logics in the Security Protocols Analysis
skos:notation
RIV/00216305:26230/06:PU66880!RIV07-MSM-26230___
n3:strany
395-399
n3:aktivita
n12:Z n12:P
n3:aktivity
P(GA102/05/0467), P(GA102/05/0723), P(GD102/05/H050), Z(MSM0021630503)
n3:dodaniDat
n4:2007
n3:domaciTvurceVysledku
n13:2050951 n13:8901015
n3:druhVysledku
n19:D
n3:duvernostUdaju
n10:S
n3:entitaPredkladatele
n7:predkladatel
n3:idSjednocenehoVysledku
505296
n3:idVysledku
RIV/00216305:26230/06:PU66880
n3:jazykVysledku
n17:eng
n3:klicovaSlova
Modal Logic, Security Protocol, Analysis<br>
n3:klicoveSlovo
n6:Analysis%3Cbr%3E n6:Modal%20Logic n6:Security%20Protocol
n3:kontrolniKodProRIV
[33252B8ADB52]
n3:mistoKonaniAkce
Brno
n3:mistoVydani
Brno
n3:nazevZdroje
Proceedings of the 12th Conference STUDENT EEICT 2006
n3:obor
n14:JC
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:projekt
n9:GD102%2F05%2FH050 n9:GA102%2F05%2F0467 n9:GA102%2F05%2F0723
n3:rokUplatneniVysledku
n4:2006
n3:tvurceVysledku
Očenášek, Pavel Trchalík, Roman
n3:typAkce
n20:CST
n3:zahajeniAkce
2006-04-27+02:00
n3:zamer
n21:MSM0021630503
s:numberOfPages
5
n15:hasPublisher
Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
n18:isbn
80-214-3163-6
n22:organizacniJednotka
26230