National Repository of Grey Literature 13 records found  previous11 - 13  jump to record: Search took 0.01 seconds. 
Library of Functions for the Support of Communication Protocols Design
Tomášek, Karel ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Security protocols are used for establishing secure communication over insecure network. This document gives a brief introduction into description and formal specification in the area of security protocols design. It also includes description of the aplication library, its functions and methods how to use it.
Methods of the Security Protocols Design
Míchal, Luboš ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This thesis deals with the design of such protocols and their properties. The first part deals with properties and requirements of designed protocol as well as with the most common attacks on protocols. In the second part, the method of trace formula is described in more detail. This method is used for analytic design of security protocols. Later, the library of automated functions was created upon the principles of the method. The library support both the handling of protocol properties and protocol design. The thesis concludes with some examples of generated protocols.
Tools for analyzing security protocols
Duchovič, Adam ; Burda, Karel (referee) ; Pelka, Tomáš (advisor)
This thesis is focused on tools which are used to analyzed security protocols. In the beginning of the thesis key goals of security protocols are mentioned and also basic attacks on them are illustrated. Subsequently basic verification techniques, specification languages and verification tools are described. Next part of thesis contains description of protocols in common syntax. Then the main standards used for evaluation of information security products are mentioned. In the end of thesis two well-known verification tools – AVISPA and Scyther - are described and compared to designed methodology of comparing verification tools and their outputs.

National Repository of Grey Literature : 13 records found   previous11 - 13  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.