Show simple item record

dc.contributor.advisorDinolt, George
dc.contributor.advisorHerzog, Jonathan
dc.contributor.authorHoffmeister, Chris W.
dc.date.accessioned2012-03-14T17:38:50Z
dc.date.available2012-03-14T17:38:50Z
dc.date.issued2007-03
dc.identifier.urihttp://hdl.handle.net/10945/3596
dc.description.abstractCurrent day communication systems rely on protocols to provide secure communications among parties. Weaknesses in protocols, at first thought to be secure, have been found through deep analysis. There are many systems that have been designed to provide a means to test the various security characteristics of communication protocols. We present an evaluation methodology that can be used to evaluate protocol analysis systems based on their scope, correctness, performance, and usability characteristics. We apply portions of the methodology to a set of protocol analysis systems to show the evaluation methodology in action.en_US
dc.description.urihttp://archive.org/details/anevaluationmeth109453596
dc.format.extentxviii, 243 p. ;en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.subject.lcshMethodologyen_US
dc.subject.lcshCryptographyen_US
dc.titleAn evaluation methodology for protocol analysis systemsen_US
dc.typeThesisen_US
dc.contributor.corporateNaval Postgraduate School (U.S.)
dc.description.serviceUS Navy (USN) author.en_US
dc.identifier.oclc129752188
etd.thesisdegree.nameM.S.en_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.verifiednoen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record