National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Tools for Environment for the Simulation of Communication
Mikuš, Peter ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Communication between devices should be based on predefined rules. These rules are called communication protocols. In this master thesis I am concerned with communication protocols, specially security protocols. Their design demand specialized tools, that will provide interactive simulations and security testing. I have described each of these tools in detail and mentioned about their properties, their pros and cons. In available tools I have implemented security protocols. The result is set of demonstration tasks that are usable in network courses at FIT VUT
Analysis of Selected Security Protocols
Malecký, Marek ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The subject of this thesis is to study available security protocols and tools for their verification. The first part is devoted to briefly describe the concepts related to the area of security protocols and verification logics. The second part directly lists various protocols, along with attacks and errors found in design. Next chapter describes the most important tools for automatic analysis of security protocols in more detail. The main part deals with verification of security protocols selected in the chosen tool called Scyther. In conclusion, examples of multiprotocol attacks along with a summary table are displayed.
Tools for Environment for the Simulation of Communication
Mikuš, Peter ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Communication between devices should be based on predefined rules. These rules are called communication protocols. In this master thesis I am concerned with communication protocols, specially security protocols. Their design demand specialized tools, that will provide interactive simulations and security testing. I have described each of these tools in detail and mentioned about their properties, their pros and cons. In available tools I have implemented security protocols. The result is set of demonstration tasks that are usable in network courses at FIT VUT
Analysis of Selected Security Protocols
Malecký, Marek ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The subject of this thesis is to study available security protocols and tools for their verification. The first part is devoted to briefly describe the concepts related to the area of security protocols and verification logics. The second part directly lists various protocols, along with attacks and errors found in design. Next chapter describes the most important tools for automatic analysis of security protocols in more detail. The main part deals with verification of security protocols selected in the chosen tool called Scyther. In conclusion, examples of multiprotocol attacks along with a summary table are displayed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.