Поле DC | Значение | Язык |
dc.contributor.author | Konstantinov, I. S. | - |
dc.contributor.author | Lazarev, S. A. | - |
dc.contributor.author | Kiselev, V. E. | - |
dc.contributor.author | Demidov, A. V. | - |
dc.date.accessioned | 2020-06-01T16:58:15Z | - |
dc.date.available | 2020-06-01T16:58:15Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Approaches to the security analysis of authentication and authorization protocols in distributed systems / I.S. Konstantinov, S.A. Lazarev, V.E. Kiselev [et al.] // International Journal of Innovative Technology and Exploring Engineering. - 2019. - Vol.8, №6, spec. is.3.-P. 610-613. | ru |
dc.identifier.uri | http://dspace.bsu.edu.ru/handle/123456789/31187 | - |
dc.description.abstract | In this article, a review of the most used approaches for the formal analysis of distributed systems cryptographic protocols and software tools implemented on the basis of these approaches has been done. The article examines such approaches as model checking, theorem proving, and believe logic, provides a list of well-known tools for automating the analysis of cryptographic protocols within each approach | ru |
dc.language.iso | en | ru |
dc.subject | technique | ru |
dc.subject | computer engineering | ru |
dc.subject | authentication | ru |
dc.subject | authorization | ru |
dc.subject | distributed systems | ru |
dc.subject | model checking | ru |
dc.subject | protocol security | ru |
dc.title | Approaches to the security analysis of authentication and authorization protocols in distributed systems | ru |
dc.type | Article | ru |
Располагается в коллекциях: | Статьи из периодических изданий и сборников (на иностранных языках) = Articles from periodicals and collections (in foreign languages)
|