-
1
-
-
0034317075
-
Key-agreement in ad-hoc networks
-
N. Asokan and P. Ginzboorg. Key-agreement in ad-hoc networks. Computer Communications, 23(17):1627-1637, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
2
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Feburary, San Diego, California
-
D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to strangers: Authentication in ad-hoc wireless networks, Feburary 2002. In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California.
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
3
-
-
24644483295
-
Exploiting empirical engagement in authentication protocol design
-
nd International Conference on Security in Pervasive Computing (SPC'05), Boppard, Germany, April. Springer
-
nd International Conference on Security in Pervasive Computing (SPC'05), volume 3450 of LNCS, Boppard, Germany, April 2005. Springer.
-
(2005)
LNCS
, vol.3450
-
-
Creese, S.1
Goldsmith, M.2
Harrison, R.3
Roscoe, B.4
Whittaker, P.5
Zakiuddin, I.6
-
4
-
-
33749000732
-
The attacker in ubiquitous computing environments: Formalising the threat model
-
T. Dimitrakos and F. Martinelli, editors, Pisa, Italy, September. IIT-CNR Technical Report
-
S. Creese, M. H. Goldsmith, B. Roscoe, and I. Zakiuddin. The attacker in ubiquitous computing environments: Formalising the threat model. In T. Dimitrakos and F. Martinelli, editors, Workshop on Formal Aspects in Security and Trust, Pisa, Italy, September 2003. IIT-CNR Technical Report.
-
(2003)
Workshop on Formal Aspects in Security and Trust
-
-
Creese, S.1
Goldsmith, M.H.2
Roscoe, B.3
Zakiuddin, I.4
-
5
-
-
2942561885
-
Authentication in pervasive computing
-
D. Hutter and M. Ullman, editors, Boppard, March. Springer LNCS
-
S. Creese, M. H. Goldsmith, B. Roscoe, and I. Zakiuddin. Authentication in pervasive computing. In D. Hutter and M. Ullman, editors, First International Conference on Security in Pervasive Computing, Boppard, March 2003. Springer LNCS.
-
(2003)
First International Conference on Security in Pervasive Computing
-
-
Creese, S.1
Goldsmith, M.H.2
Roscoe, B.3
Zakiuddin, I.4
-
7
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using for
-
Proceedings of TAC AS. Springer Verlag
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FOR. In Proceedings of TAC AS, volume 1055 of LNCS, pages 147-166. Springer Verlag, 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
9
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A. W. Roscoe and P. J. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal of Computer Security, 7, 1999.
-
(1999)
Journal of Computer Security
, vol.7
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
12
-
-
33751042834
-
-
MSc, Oxford University Computing Laboratory, September. Sumbmitted
-
M. Xiao. Verifying the PDA-mesh protocol. MSc, Oxford University Computing Laboratory, September 2005. Sumbmitted.
-
(2005)
Verifying the PDA-mesh Protocol
-
-
Xiao, M.1
|