메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 369-375

Bootstrapping multi-party ad-hoc security

Author keywords

Bootstrapping security; Pervasive computing

Indexed keywords

ADAPTIVE SYSTEMS; BANDWIDTH; COMPUTATIONAL METHODS; CONSTRAINT THEORY; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA; TELECOMMUNICATION SYSTEMS;

EID: 33751023842     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1141277.1141362     Document Type: Conference Paper
Times cited : (9)

References (12)
  • 1
    • 0034317075 scopus 로고    scopus 로고
    • Key-agreement in ad-hoc networks
    • N. Asokan and P. Ginzboorg. Key-agreement in ad-hoc networks. Computer Communications, 23(17):1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 3
    • 24644483295 scopus 로고    scopus 로고
    • Exploiting empirical engagement in authentication protocol design
    • nd International Conference on Security in Pervasive Computing (SPC'05), Boppard, Germany, April. Springer
    • nd International Conference on Security in Pervasive Computing (SPC'05), volume 3450 of LNCS, Boppard, Germany, April 2005. Springer.
    • (2005) LNCS , vol.3450
    • Creese, S.1    Goldsmith, M.2    Harrison, R.3    Roscoe, B.4    Whittaker, P.5    Zakiuddin, I.6
  • 4
    • 33749000732 scopus 로고    scopus 로고
    • The attacker in ubiquitous computing environments: Formalising the threat model
    • T. Dimitrakos and F. Martinelli, editors, Pisa, Italy, September. IIT-CNR Technical Report
    • S. Creese, M. H. Goldsmith, B. Roscoe, and I. Zakiuddin. The attacker in ubiquitous computing environments: Formalising the threat model. In T. Dimitrakos and F. Martinelli, editors, Workshop on Formal Aspects in Security and Trust, Pisa, Italy, September 2003. IIT-CNR Technical Report.
    • (2003) Workshop on Formal Aspects in Security and Trust
    • Creese, S.1    Goldsmith, M.H.2    Roscoe, B.3    Zakiuddin, I.4
  • 7
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using for
    • Proceedings of TAC AS. Springer Verlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FOR. In Proceedings of TAC AS, volume 1055 of LNCS, pages 147-166. Springer Verlag, 1996.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 9
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A. W. Roscoe and P. J. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal of Computer Security, 7, 1999.
    • (1999) Journal of Computer Security , vol.7
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 12
    • 33751042834 scopus 로고    scopus 로고
    • MSc, Oxford University Computing Laboratory, September. Sumbmitted
    • M. Xiao. Verifying the PDA-mesh protocol. MSc, Oxford University Computing Laboratory, September 2005. Sumbmitted.
    • (2005) Verifying the PDA-mesh Protocol
    • Xiao, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.