By the same authors

A search-based approach to the automated design of security protocols

Research output: Book/ReportOther report

Standard

A search-based approach to the automated design of security protocols. / Hao, C; Clark, JA; Jacob, Jeremy Lawrence.

YCS-2004-376 ed. Department of Computer Science, University of York, 2004. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); Vol. YCS , No. YCS-2004-376).

Research output: Book/ReportOther report

Harvard

Hao, C, Clark, JA & Jacob, JL 2004, A search-based approach to the automated design of security protocols. York Computer Science Technical Report Series ("Yellow Reports"), no. YCS-2004-376, vol. YCS , vol. York Computer Science Technical Report , YCS-2004-376 edn, Department of Computer Science, University of York.

APA

Hao, C., Clark, JA., & Jacob, J. L. (2004). A search-based approach to the automated design of security protocols. (YCS-2004-376 ed.) (York Computer Science Technical Report Series ("Yellow Reports"); Vol. YCS , No. YCS-2004-376). Department of Computer Science, University of York.

Vancouver

Hao C, Clark JA, Jacob JL. A search-based approach to the automated design of security protocols. YCS-2004-376 ed. Department of Computer Science, University of York, 2004. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); YCS-2004-376).

Author

Hao, C ; Clark, JA ; Jacob, Jeremy Lawrence. / A search-based approach to the automated design of security protocols. YCS-2004-376 ed. Department of Computer Science, University of York, 2004. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); YCS-2004-376).

Bibtex - Download

@book{27833f09c18a4410b77b56bc37ff7300,
title = "A search-based approach to the automated design of security protocols",
abstract = "Security protocols play an important role in modern communications. However,security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesise public key protocols and hybrid protocols.",
keywords = "Metaheuristic Search, Authentication protocols, Automatic synthesis, Simulated annealing, Genetic Algorithms, Protocols library",
author = "C Hao and JA Clark and Jacob, {Jeremy Lawrence}",
note = "Freely available already.",
year = "2004",
language = "English",
volume = "York Computer Science Technical Report",
series = "York Computer Science Technical Report Series ({"}Yellow Reports{"})",
publisher = "Department of Computer Science, University of York",
number = "YCS-2004-376",
edition = "YCS-2004-376",

}

RIS (suitable for import to EndNote) - Download

TY - BOOK

T1 - A search-based approach to the automated design of security protocols

AU - Hao, C

AU - Clark, JA

AU - Jacob, Jeremy Lawrence

N1 - Freely available already.

PY - 2004

Y1 - 2004

N2 - Security protocols play an important role in modern communications. However,security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesise public key protocols and hybrid protocols.

AB - Security protocols play an important role in modern communications. However,security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesise public key protocols and hybrid protocols.

KW - Metaheuristic Search

KW - Authentication protocols

KW - Automatic synthesis

KW - Simulated annealing

KW - Genetic Algorithms

KW - Protocols library

M3 - Other report

VL - York Computer Science Technical Report

T3 - York Computer Science Technical Report Series ("Yellow Reports")

BT - A search-based approach to the automated design of security protocols

PB - Department of Computer Science, University of York

ER -