National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Specifications Database of Security Protocols
Ondráček, David ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.
Instant Messaging Network Analysis and Reconstruction (YMSG and YMSG)
Pluskal, Jan ; Polčák, Libor (referee) ; Veselý, Vladimír (advisor)
The goal of this Bachelor's thesis is analysis and reconstruction of network communication using YMSG and ICQ protocols. This paper contains detail description and message structure of these two protocols. Subsequently creation of experimental tool is discussed and used for reconstruction of YMSG communication. Results show that output of this tool is correct with reference to YMSG protocol. Thesis also outlines MS Network Monitor and introduces specialized NPL parsers for YMSG and ICQ.
Instant Messaging Network Analysis and Reconstruction (YMSG and YMSG)
Pluskal, Jan ; Polčák, Libor (referee) ; Veselý, Vladimír (advisor)
The goal of this Bachelor's thesis is analysis and reconstruction of network communication using YMSG and ICQ protocols. This paper contains detail description and message structure of these two protocols. Subsequently creation of experimental tool is discussed and used for reconstruction of YMSG communication. Results show that output of this tool is correct with reference to YMSG protocol. Thesis also outlines MS Network Monitor and introduces specialized NPL parsers for YMSG and ICQ.
Specifications Database of Security Protocols
Ondráček, David ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.
Verbal reports and protocol analysis
Heller, Daniel
The author deals with problems of verbal reports in psychological research. Today, the concurrent and retrospective verbal reports are considered to be the main source of data about cognitive processes of subject. They became the standard research method also in many fields of applied psychology. Thinking aloud is distinguished from verbal explanation of particular steps of problem solving. Effects of verbalization, problem of completeness of verbal reports, inferences from verbal data, Ericsson's and Simon's model of verbalization, methods and techniques of protocol analysis are dealt with. Verbal reports are rich source of data that can be combined effectively with other data and can be of great value for acquiring knowledge about more than cognitive processes and structures. Practical recommendations for gaining different types of verbal reports under standard conditions are presented that can be analysed by the means of protocol analysis.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.