dc.contributor.author | Γκρίτζαλης, Στέφανος | el |
dc.contributor.author | Σπινέλλης, Διομήδης Δ. | el |
dc.contributor.author | Γεωργιάδης, Παντελής | el |
dc.date.accessioned | 2015-06-12T10:43:36Z | |
dc.date.available | 2015-06-12T10:43:36Z | |
dc.date.issued | 2015-06-12 | |
dc.identifier.uri | http://hdl.handle.net/11400/15803 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://www.sciencedirect.com/science/article/pii/S0140366499000304# | el |
dc.subject | Formal methods (Computer science) | |
dc.subject | Protocol analysis tools | |
dc.subject | Εργαλεία ανάλυσης πρωτοκόλλου | |
dc.subject | Τυπικές μέθοδοι | |
dc.subject | Security protocols | |
dc.subject | Πρωτόκολλα ασφαλείας | |
dc.subject | Cryptographic protocols | |
dc.subject | Πρωτόκολλα κρυπτογράφησης | |
dc.title | Security protocols over open networks and distributed systems | en |
heal.type | journalArticle | |
heal.secondaryTitle | formal methods for their analysis, design, and verification | en |
heal.classification | Technology | |
heal.classification | Computer science | |
heal.classification | Τεχνολογία | |
heal.classification | Πληροφορική | |
heal.classificationURI | http://zbw.eu/stw/descriptor/10470-6 | |
heal.classificationURI | http://skos.um.es/unescothes/C00750 | |
heal.classificationURI | **N/A**-Τεχνολογία | |
heal.classificationURI | **N/A**-Πληροφορική | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh99003622 | |
heal.language | en | |
heal.access | campus | |
heal.recordProvider | doi:10.1016/S0140-3664(99)00030-4 | el |
heal.publicationDate | 1999-05-25 | |
heal.bibliographicCitation | Gritzalis, S., Spinellis, D. and Georgiadis, P. (1999). Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. "Computer Communications", 22(8), 25 May 1999. pp. 697-709. Available from: http://www.sciencedirect.com/science/article/pii/S0140366499000304#. [Accessed 20/05/1999] | en |
heal.abstract | Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the examination of robustness principles and application limitations. Modern high-level specification languages and tools can be used for automatically analysing cryptographic protocols. Recent research work focuses on the ex-ante use of formal methods in the design state of new security protocols, as the synthesis approach. Finally, an outline is presented on current trends for the utilisation of formal methods for the analysis and verification of modern complicated protocols and protocol suites for the real commercial world. Keywords | en |
heal.journalName | Computer Communications | en |
heal.journalType | peer-reviewed | |
heal.fullTextAvailability | true |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: