메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 181-190

Formal verification of the IEEE 802.11i WLAN security protocol

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); FORMAL LOGIC; LOCAL AREA NETWORKS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33750125870     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASWEC.2006.29     Document Type: Conference Paper
Times cited : (13)

References (29)
  • 4
    • 17144385343 scopus 로고    scopus 로고
    • October
    • Wi-Fi Alliance. Wi-Fi Protected Access, October 2002. URL: http://www.wi-fi.org/OpenSection/pdf/Wi-Fi Protected Access Overview.pdf
    • (2002) Wi-Fi Protected Access
  • 9
    • 0017985798 scopus 로고
    • General technique for communications protocol validation
    • C.H. West, "General technique for communications protocol validation", IBM Journal of Research and Development, 22(4), 1978.
    • (1978) IBM Journal of Research and Development , vol.22 , Issue.4
    • West, C.H.1
  • 10
    • 0000289556 scopus 로고    scopus 로고
    • Formal methods: State of the art and future directions
    • M.C. Edmund, and M.W. Jeannette, "Formal methods: state of the art and future directions", ACM Computing Surveys, 28(4):626 - 643, 1996.
    • (1996) ACM Computing Surveys , vol.28 , Issue.4 , pp. 626-643
    • Edmund, M.C.1    Jeannette, M.W.2
  • 12
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • G. J. Holzmann, "The model checker SPIN", Software Engineering, 23(5):279 - 295, 1997.
    • (1997) Software Engineering , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 16
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. Yao, "On the security of public key protocols", IEEE transactions on Information Theory, 29(2):198-208, March 1989.
    • (1989) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 20
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • St.Louis, Missouri, USA; 15 - 21 May
    • J. Jürjens, "Sound Methods and Effective Tools for Model-based Security Engineering with UML", 27th International Conference on Software Engineering, St.Louis, Missouri, USA; 15 - 21 May 2005
    • (2005) 27th International Conference on Software Engineering
    • Jürjens, J.1
  • 21
    • 11844280302 scopus 로고    scopus 로고
    • Is this a revolutionary idea, or not?
    • Robert L. Glass, "Is this a revolutionary idea, or not?", Communications of the ACM, 47(11):23 -25, 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.11 , pp. 23-25
    • Glass, R.L.1
  • 29
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1X standard
    • National Institute of Standards, February
    • Mishra, A. Arbaugh, W.A. "An Initial Security Analysis of the IEEE 802.1X Standard", Critical Infrastructure Grant, National Institute of Standards, February 2002.
    • (2002) Critical Infrastructure Grant
    • Mishra, A.1    Arbaugh, W.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.