p.852
p.856
p.861
p.865
p.870
p.874
p.878
p.882
p.887
Automation of Authentication and Key Distribution Schemes Design Based on Trace Formulae
Abstract:
The authentication and key distribution schemes are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This paper deals with the concept of design of such schemes (protocols) and their properties. The paper starts with the properties and requirements of designed protocol, followed by the description of the design concept based on the trace formula and the process of its automation within the design library. The presented library supports both the handling of protocol properties and protocol design.
Info:
Periodical:
Pages:
870-873
Citation:
Online since:
February 2012
Authors:
Price:
Сopyright:
© 2012 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: