메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1326-1331

Security analysis of routing protocol for MANET based on extended Rubin logic

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; LAWS AND LEGISLATION; NETWORK ROUTING;

EID: 49249090421     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNSC.2008.4525423     Document Type: Conference Paper
Times cited : (8)

References (22)
  • 9
    • 34547689144 scopus 로고    scopus 로고
    • Security analysis of routing protocol for MANET based on BAN logic
    • Apr
    • Y. L. Wang, J. Z. Wang, and M. Q. Wang, "Security analysis of routing protocol for MANET based on BAN logic," Journal on Communications, vol. 26, no. 4, pp. 125-129, Apr. 2005.
    • (2005) Journal on Communications , vol.26 , Issue.4 , pp. 125-129
    • Wang, Y.L.1    Wang, J.Z.2    Wang, M.Q.3
  • 15
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi, and Needham logic
    • D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," ACM Operating Systems Review, vol. 24, no. 2, pp. 35-38, 1990.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 16
    • 0036045935 scopus 로고    scopus 로고
    • BAN-like logic for cryptographic protocols analysis: A survey
    • Y.Q. Zhang, J. P. Wu, and X. Li, "BAN-like logic for cryptographic protocols analysis: a survey," Journal of Tsinghua University (Sci & Tech), vol. 42, no. 1, pp. 96-99, 2002.
    • (2002) Journal of Tsinghua University (Sci & Tech) , vol.42 , Issue.1 , pp. 96-99
    • Zhang, Y.Q.1    Wu, J.P.2    Li, X.3
  • 17
    • 0034434717 scopus 로고    scopus 로고
    • The model and its defects of BAN family of logic
    • Dec
    • J. Z. Xu, Y. X. Dai, and Y.N. Zuo, "The model and its defects of BAN family of logic," Journal of Software, vol. 1, no. 12, pp. 1660-1665, Dec. 2000.
    • (2000) Journal of Software , vol.1 , Issue.12 , pp. 1660-1665
    • Xu, J.Z.1    Dai, Y.X.2    Zuo, Y.N.3
  • 18
    • 2342542981 scopus 로고
    • Nonmonotonic cryptographic protocols,
    • Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI
    • A.D. Rubin, "Nonmonotonic cryptographic protocols," Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI, 1994.
    • (1994)
    • Rubin, A.D.1
  • 19
    • 0031386327 scopus 로고    scopus 로고
    • Extending NCP for protocols using public keys
    • Mar
    • A. D. Rubin, "Extending NCP for protocols using public keys," Mobile Networks and Applications, vol. 2, no. 3, pp. 227-241, Mar. 1997.
    • (1997) Mobile Networks and Applications , vol.2 , Issue.3 , pp. 227-241
    • Rubin, A.D.1
  • 20
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • R. Kailar "Accountability in electronic commerce protocols," IEEE Trans. Software Engineering, vol. 22, no. 5, pp. 313-328, 1996.
    • (1996) IEEE Trans. Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 21
    • 0000260312 scopus 로고    scopus 로고
    • Limitations of Kailar Logic
    • Dec
    • D. C. Zhou, S. H. Qing, and Z. F. Zhou, "Limitations of Kailar Logic," Journal of Software, vol. 10, no. 12, pp. 1238-1245, Dec. 1999.
    • (1999) Journal of Software , vol.10 , Issue.12 , pp. 1238-1245
    • Zhou, D.C.1    Qing, S.H.2    Zhou, Z.F.3
  • 22
    • 0035467046 scopus 로고    scopus 로고
    • A new approach for the analysis of electronic commerce protocols
    • Sept
    • D. C. Zhou, S. H. Qing, and Z. F. Zhou, "A new approach for the analysis of electronic commerce protocols," Journal of Software, vol. 12, no. 9, pp. 1318-1328, Sept. 2001.
    • (2001) Journal of Software , vol.12 , Issue.9 , pp. 1318-1328
    • Zhou, D.C.1    Qing, S.H.2    Zhou, Z.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.