Skip navigation
BelSU DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bsu.edu.ru/handle/123456789/31187
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKonstantinov, I. S.-
dc.contributor.authorLazarev, S. A.-
dc.contributor.authorKiselev, V. E.-
dc.contributor.authorDemidov, A. V.-
dc.date.accessioned2020-06-01T16:58:15Z-
dc.date.available2020-06-01T16:58:15Z-
dc.date.issued2019-
dc.identifier.citationApproaches to the security analysis of authentication and authorization protocols in distributed systems / I.S. Konstantinov, S.A. Lazarev, V.E. Kiselev [et al.] // International Journal of Innovative Technology and Exploring Engineering. - 2019. - Vol.8, №6, spec. is.3.-P. 610-613.ru
dc.identifier.urihttp://dspace.bsu.edu.ru/handle/123456789/31187-
dc.description.abstractIn this article, a review of the most used approaches for the formal analysis of distributed systems cryptographic protocols and software tools implemented on the basis of these approaches has been done. The article examines such approaches as model checking, theorem proving, and believe logic, provides a list of well-known tools for automating the analysis of cryptographic protocols within each approachru
dc.language.isoenru
dc.subjecttechniqueru
dc.subjectcomputer engineeringru
dc.subjectauthenticationru
dc.subjectauthorizationru
dc.subjectdistributed systemsru
dc.subjectmodel checkingru
dc.subjectprotocol securityru
dc.titleApproaches to the security analysis of authentication and authorization protocols in distributed systemsru
dc.typeArticleru
Appears in Collections:Статьи из периодических изданий и сборников (на иностранных языках) = Articles from periodicals and collections (in foreign languages)

Files in This Item:
File Description SizeFormat 
Konstantinov_Approaches.pdf276.66 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.