메뉴 건너뛰기




Volumn 3450, Issue , 2005, Pages 119-133

Exploiting empirical engagement in authentication protocol design

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMMUNICATION CHANNELS (INFORMATION THEORY); MATHEMATICAL MODELS; MOBILE COMPUTING; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 24644483295     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-32004-3_14     Document Type: Conference Paper
Times cited : (29)

References (9)
  • 1
    • 0034317075 scopus 로고    scopus 로고
    • Key-agreement in ad-hoc networks
    • N. Asokan and Philip Ginzboorg. Key-agreement in ad-hoc networks. Computer Communications, 23(17):1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 3
    • 33749000732 scopus 로고    scopus 로고
    • The attacker in ubiquitous computing environments: Formalising the threat model
    • Theo Dimitrakos and Fabio Martinelli, editors, Pisa, Italy, September. IIT-CNR Technical Report
    • S. Creese, M. H. Goldsmith, Bill Roscoe, and Irfan Zakiuddin. The attacker in ubiquitous computing environments: Formalising the threat model. In Theo Dimitrakos and Fabio Martinelli, editors, Workshop on Formal Aspects in Security and Trust, Pisa, Italy, September 2003. IIT-CNR Technical Report.
    • (2003) Workshop on Formal Aspects in Security and Trust
    • Creese, S.1    Goldsmith, M.H.2    Roscoe, B.3    Zakiuddin, I.4
  • 6
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • number 2851 in LNCS. Springer-Verlag, October
    • Tim Kindberg and Kan Zhang. Validating and securing spontaneous associations between wireless devices. In 6 Information Security Conference (ISC'03), number 2851 in LNCS. Springer-Verlag, October 2003.
    • (2003) 6 Information Security Conference (ISC'03)
    • Kindberg, T.1    Zhang, K.2
  • 9
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for adhoc wireless networks
    • B. Christianson, B. Crispo, and M. Roe, editors. Springer LNCS
    • Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for adhoc wireless networks. In B. Christianson, B. Crispo, and M. Roe, editors, Security Protocols, 7th International Workshop Proceedings, pages 172-194. Springer LNCS, 1999.
    • (1999) Security Protocols, 7th International Workshop Proceedings , pp. 172-194
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.