Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika, 2010, supplement № 3, Pages 65–66 (Mi pdm232)  

Mathematical Foundations of Computer Security

Using Scyther for analysis SKID3 security

M. I. Tsoy

Tomsk State University
References:
Abstract: Results of SKID3 protocol security analysis are provided in this paper. An attempt to find a man-in-the-middle attack on this protocol (mentioned by B. Schneier in his book) was made. For this purpose, the author used the Scyther tool created by Cas Cremers and came to the conclusion that SKID3 is rather invulnarable to the man-in-the-middle attack.
Document Type: Article
UDC: 004.056
Language: Russian
Citation: M. I. Tsoy, “Using Scyther for analysis SKID3 security”, Prikl. Diskr. Mat., 2010, supplement № 3, 65–66
Citation in format AMSBIB
\Bibitem{Tso10}
\by M.~I.~Tsoy
\paper Using Scyther for analysis SKID3 security
\jour Prikl. Diskr. Mat.
\yr 2010
\pages 65--66
\issueinfo supplement № 3
\mathnet{http://mi.mathnet.ru/pdm232}
Linking options:
  • https://www.mathnet.ru/eng/pdm232
  • https://www.mathnet.ru/eng/pdm/y2010/i12/p65
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Прикладная дискретная математика
    Statistics & downloads:
    Abstract page:489
    Full-text PDF :144
    References:75
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024