-
1
-
-
17644411480
-
Mobile values, new names, and secure communication
-
ACM Press, New York
-
Abadi M., and Fournet C. Mobile values, new names, and secure communication. Proc. 28th ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages (POPL'01) (2001), ACM Press, New York 104-115
-
(2001)
Proc. 28th ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: the spi calculus
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inform. and Comput. 148 1 (1999) 1-70
-
(1999)
Inform. and Comput.
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
17144474103
-
-
L. Bettini, V. Bono, R.D. Nicola, G. Ferrari, D. Gorla, M. Loreti, E. Moggi, R. Pugliese, E. Tuosto, B. Venneri, The klaim project: theory and practice, in: Global Computing-Programming Environments, Languages, Security and Analysis of Systems, Lecture Notes in Computer Science, Vol. 2874, Springer, Berlin, 2003.
-
-
-
-
4
-
-
0346263728
-
Formal verification of standards for distance vector routing protocols
-
Bhargavan K., Obradovic D., and Gunter C.A. Formal verification of standards for distance vector routing protocols. J. ACM 49 4 (2002) 538-576
-
(2002)
J. ACM
, vol.49
, Issue.4
, pp. 538-576
-
-
Bhargavan, K.1
Obradovic, D.2
Gunter, C.A.3
-
5
-
-
24144452823
-
Static validation of security protocols
-
Bodei C., Buchholtz M., Degano P., Nielson H.R., and Nielson F. Static validation of security protocols. J. Comput. Security 13 3 (2005) 347-390
-
(2005)
J. Comput. Security
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, H.R.4
Nielson, F.5
-
6
-
-
84945976575
-
Control flow analysis for the pi-calculus
-
Springer, Berlin
-
Bodei C., Degano P., Nielson F., and Nielson H.R. Control flow analysis for the pi-calculus. Proc. Ninth Internat. Conf. on Concurrency Theory (CONCUR'98) (1998), Springer, Berlin 84-98
-
(1998)
Proc. Ninth Internat. Conf. on Concurrency Theory (CONCUR'98)
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
10
-
-
33750440998
-
-
S. Chiyangwa, M. Kwiatkowska, An analysis of timed properties of AODV, in: Proc. Seventh IFIP Internat. Conf. on Formal Methods for Open Object-based Distributed Systems (FMOODS'05), 2005.
-
-
-
-
11
-
-
33750444142
-
-
C. Ene, T. Muntean, A broadcast-based calculus for communicating systems, in: Sixth Internat. Workshop on Formal Methods for Parallel Programming: Theory and Applications, 2001.
-
-
-
-
12
-
-
0033344295
-
-
F.J.T. Fabrega, J. Herzog, J.D. Guttman, Strand spaces: proving security protocols correct, J. Comput. Security (1999) 191-230.
-
-
-
-
13
-
-
33750442405
-
-
M. Guerrero Zapata, Secure ad hoc on-demand distance vector (SAODV) routing, IETF Internet Draft, 7 February 2006.
-
-
-
-
14
-
-
0036980294
-
-
M. Guerrero Zapata, N. Asokan, Securing ad hoc routing protocols, in: Proc. 2002 ACM Workshop on Wireless Security (WiSe'02), 2002, pp. 1-10.
-
-
-
-
16
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski K. (Ed), Kluwer Academic Publishers, Dordrecht
-
Johnson D.B., and Maltz D.A. Dynamic source routing in ad hoc wireless networks. In: Imielinski K. (Ed). Mobile Computing Vol. 353 (1996), Kluwer Academic Publishers, Dordrecht
-
(1996)
Mobile Computing
, vol.353
-
-
Johnson, D.B.1
Maltz, D.A.2
-
17
-
-
33750448512
-
-
S. Nanz, Specification and security analysis of mobile ad hoc networks, Ph.D. Thesis, Imperial College London, 2006.
-
-
-
-
18
-
-
33750491497
-
-
S. Nanz, C. Hankin, Static analysis of routing protocols for ad-hoc networks, in: Proc. 2004 ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security (WITS'04), 2004, pp. 141-152.
-
-
-
-
19
-
-
29244437139
-
-
S. Nanz, C. Hankin, Formal security analysis for ad-hoc networks, in: Proc. 2004 Workshop on Views on Designing Complex Architectures (VODCA'04), Electronic Notes in Theoretical Computer Science, Vol. 142, 2006, pp. 195-213.
-
-
-
-
21
-
-
21144454095
-
-
F. Nielson, H.R. Nielson, H. Sun, M. Buchholtz, R. Rydhof Hansen, H. Pilegaard, H. Seidl, The succinct solver suite, in: Proc. 10th Internat. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), Lecture Notes in Computer Science, Vol. 2988, Springer, Berlin, 2003, pp. 251-265.
-
-
-
-
22
-
-
35048839066
-
-
H.R. Nielson, F. Nielson, Flow logic: a multi-paradigmatic approach to static analysis, Essence of Computation: Complexity, Analysis, Transformation (2002) 223-244.
-
-
-
-
23
-
-
35048845165
-
-
H.R. Nielson, F. Nielson, H. Pilegaard, Spatial analysis of bioambients, in: Static Analysis Symposium (SAS'04), Lecture Notes in Computer Science, Vol. 3148, Springer, Berlin, 2004, pp. 69-83.
-
-
-
-
24
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85-128
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
25
-
-
33750489969
-
-
C.E. Perkins, E.M. Belding-Royer, S. Das, Ad hoc on-demand distance vector (AODV) routing, IETF RFC 3561, July 2003.
-
-
-
-
26
-
-
34347349933
-
-
C.E. Perkins, E.M. Royer, Ad-hoc on demand distance vector routing, in: Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), 1999.
-
-
-
-
27
-
-
0029535822
-
A calculus of broadcasting systems
-
Prasad K.V.S. A calculus of broadcasting systems. Sci. Comput. Programming 25 2-3 (1995) 285-327
-
(1995)
Sci. Comput. Programming
, vol.25
, Issue.2-3
, pp. 285-327
-
-
Prasad, K.V.S.1
-
28
-
-
33750461506
-
-
P.Y.A. Ryan, S.A. Schneider, The Modelling and Analysis of Security Protocols: The CSP Approach, Addison-Wesley, Reading, 2001.
-
-
-
-
31
-
-
35048830853
-
-
O. Wibling, J. Parrow, A. Pears, Automatized verification of ad hoc routing protocols, in: Proc. 24th IFIP WG 6.1 Internat. Conf. on Formal Techniques for Networked and Distributed Systems (FORTE'04), Lecture Notes in Computer Science, Springer, Berlin, 2004.
-
-
-
-
32
-
-
21144440252
-
-
I. Zakiuddin, M. Goldsmith, P. Whittaker, P. Gardiner, A methodology for model-checking ad hoc networks, in: Model Checking Software: 10th International SPIN Workshop, Lecture Notes in Computer Science, Vol. 2648, Springer, Berlin, 2003, pp. 181-196.
-
-
-
|