-
1
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J.A., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47 (2004) 53-57
-
(2004)
Commun. ACM
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.A.2
Wagner, D.3
-
2
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA, November 3-5, ACM , 2004
-
KarAof, C, Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Baltimore, MD, USA, November 3-5, 2004, ACM (2004) 162-175
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys
, pp. 162-175
-
-
KarAof, C.1
Sastry, N.2
Wagner, D.3
-
3
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wireless Networks 8 (2002) 521-534
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
4
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Jajodia, S, Atluri, V, Jaeger, T, eds, ACM
-
Ehu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Jajodia, S., Atluri, V., Jaeger, T., eds.: ACM Conference on Computer and Communications Security, ACM (2003) 62-72
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Ehu, S.1
Setia, S.2
Jajodia, S.3
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
IEEE Computer Society
-
Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2003) 197
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
6
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Atluri, V, ed, ACM
-
Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In Atluri, V., ed.: ACM Conference on Computer and Communications Security, ACM (2002) 41-47
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
7
-
-
0034445661
-
System architecture directions for networked sensors
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D.E., Pister, K.S.J.: System architecture directions for networked sensors. In: Inter. Conf. on Architectural Support for Programming Languages and Operating Systems, ASPLOS. (2000) 93-104
-
(2000)
Inter. Conf. on Architectural Support for Programming Languages and Operating Systems, ASPLOS
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
9
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6 (1998) 53-84
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
10
-
-
26444497860
-
-
Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heam, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In Etessami, K., Rajamani, S.K., eds.: CAV. 3576 of Lecture Notes in Computer Science., Springer (2005) 281-285
-
Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heam, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In Etessami, K., Rajamani, S.K., eds.: CAV. Volume 3576 of Lecture Notes in Computer Science., Springer (2005) 281-285
-
-
-
-
11
-
-
33646140557
-
-
Tobarra, M.L., Cazorla, D., Cuartero, F., Diaz, G.: Application of formal methods to the analysis of web services security. In Bravetti, M., Kloul, L., Zavattaro, G., eds.: EPEW/WS-FM. 3670 of Lecture Notes in Computer Science., Springer (2005) 215-229
-
Tobarra, M.L., Cazorla, D., Cuartero, F., Diaz, G.: Application of formal methods to the analysis of web services security. In Bravetti, M., Kloul, L., Zavattaro, G., eds.: EPEW/WS-FM. Volume 3670 of Lecture Notes in Computer Science., Springer (2005) 215-229
-
-
-
-
12
-
-
33745824225
-
-
Backes, M., Modersheim, S., Pfitzmann, B., Vigano, L.: Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In Aceto, L., Ingólfsdóttir, A., eds.: FoSSaCS. 3921 of Lecture Notes in Computer Science., Springer (2006) 428-445
-
Backes, M., Modersheim, S., Pfitzmann, B., Vigano, L.: Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In Aceto, L., Ingólfsdóttir, A., eds.: FoSSaCS. Volume 3921 of Lecture Notes in Computer Science., Springer (2006) 428-445
-
-
-
-
13
-
-
14844303360
-
Verifying policy-based security for web services
-
Atluri, V, Pfitzmann, B, McDaniel, P.D, eds, ACM
-
Bhargavan, K., Fournet, C, Gordon, A.D.: Verifying policy-based security for web services. In Atluri, V., Pfitzmann, B., McDaniel, P.D., eds.: ACM Conference on Computer and Communications Security, ACM (2004) 268-277
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 268-277
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
14
-
-
33750073187
-
A protocol for secure public instant messaging
-
Crescenzo, G.D, Rubin, A, eds, Financial Cryptography. of, Springer
-
Mannan, M., van Oorschot, P.C.: A protocol for secure public instant messaging. In Crescenzo, G.D., Rubin, A., eds.: Financial Cryptography. Volume 4107 of Lecture Notes in Computer Science., Springer (2006) 20-35
-
(2006)
Lecture Notes in Computer Science
, vol.4107
, pp. 20-35
-
-
Mannan, M.1
van Oorschot, P.C.2
-
15
-
-
33745787568
-
-
Mitchell, J.C.: Finite-state analysis of security protocols. In Hu, A.J., Vardi, M.Y., eds.: CAV. 1427 of Lecture Notes in Computer Science., Springer (1998) 71-76
-
Mitchell, J.C.: Finite-state analysis of security protocols. In Hu, A.J., Vardi, M.Y., eds.: CAV. Volume 1427 of Lecture Notes in Computer Science., Springer (1998) 71-76
-
-
-
-
16
-
-
37049022035
-
Formal verification of TLS handshake and extensions for wireless networks
-
San Sebastian, Spain, IADIS Press
-
Tobarra, M.L., Cazorla, D., Cuartero, F., Diaz, G.: Formal verification of TLS handshake and extensions for wireless networks. In: Proc. of IADIS International Conference on Applied Computing (AC'06), San Sebastian, Spain, IADIS Press (2006) 57-64
-
(2006)
Proc. of IADIS International Conference on Applied Computing (AC'06)
, pp. 57-64
-
-
Tobarra, M.L.1
Cazorla, D.2
Cuartero, F.3
Diaz, G.4
-
17
-
-
23144433992
-
A high level protocol specification language for industrial security-sensitive protocols
-
SAPS
-
Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Mantovani, J., Modersheim, S., Vigneron, L.: A high level protocol specification language for industrial security-sensitive protocols. In: Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS). (2004) 193-205
-
(2004)
Proceedings of Workshop on Specification and Automated Processing of Security Requirements
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuellar, J.3
Drielsma, P.H.4
Mantovani, J.5
Modersheim, S.6
Vigneron, L.7
-
18
-
-
22944445210
-
-
Armando, A., Compagna, L.: SATMC: A SAT-based model checker for security protocols. In Alferes, J.J., Leite, J.A., eds.: JELIA. 3229 of Lecture Notes in Computer Science., Springer (2004) 730-733
-
Armando, A., Compagna, L.: SATMC: A SAT-based model checker for security protocols. In Alferes, J.J., Leite, J.A., eds.: JELIA. Volume 3229 of Lecture Notes in Computer Science., Springer (2004) 730-733
-
-
-
-
19
-
-
37049030912
-
A security protocol animator tool for AVISPA
-
Pisa
-
Glouche, Y., Genet, T., Heen, O., Courtay, O.: A security protocol animator tool for AVISPA. In: ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa (2006)
-
(2006)
ARTIST2 Workshop on Security Specification and Verification of Embedded Systems
-
-
Glouche, Y.1
Genet, T.2
Heen, O.3
Courtay, O.4
-
21
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61 (2000) 362-399
-
(2000)
J. Comput. Syst. Sci
, vol.61
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
22
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of 38th Annual Symposium on Foundations of Computer Science, IEEE (1997) 394-403
-
(1997)
Proceedings of 38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
23
-
-
0037268614
-
How to prevent type flaw attacks on security protocols
-
Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. Journal of Computer Security 11 (2003) 217-244
-
(2003)
Journal of Computer Security
, vol.11
, pp. 217-244
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
25
-
-
33847120377
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2 (2006) 500-528
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
26
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology. In Setia, S
-
eds, SASN, ACM
-
Watro, R.J., Kong, D., Cuti, S.f., Gardiner, C, Lynn, C, Kruus, P.: TinyPK: Securing sensor networks with public key technology. In Setia, S., Swarup, V., eds.: SASN, ACM (2004) 59-64
-
(2004)
Swarup, V
, pp. 59-64
-
-
Watro, R.J.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
|