-
1
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless Ad hoc networks
-
Jun
-
Y. Hu, D. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless Ad hoc networks," in Proc. 4th IEEE Conf. Workshop on Mobile Computing Systems and Applications, Jun. 2002, pp. 3-13.
-
(2002)
Proc. 4th IEEE Conf. Workshop on Mobile Computing Systems and Applications
, pp. 3-13
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
2
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for Ad hoc networks
-
Sep
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: a secure on-demand routing protocol for Ad hoc networks," in Proc. 8th ACM Int. Conf. Mobile Computing and Networking, Sep. 2002, pp. 12-23.
-
(2002)
Proc. 8th ACM Int. Conf. Mobile Computing and Networking
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
5
-
-
0036738266
-
SPINS: Securing protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D.E. Culler, "SPINS: securing protocols for sensor networks," Wireless Networks, vol. 8, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
7
-
-
0842283101
-
A secure protocol for Ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure protocol for Ad hoc networks," in Proc. 10th 2002 IEEE Int. Conf. Network Protocols, pp. 1-10.
-
Proc. 10th 2002 IEEE Int. Conf. Network Protocols
, pp. 1-10
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
8
-
-
15244339622
-
Authenticated routing for Ad hoc networks
-
Mar
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "Authenticated routing for Ad hoc networks," Journal on Selected Areas in Communication, vol. 23, no. 3, pp. 598-610, Mar. 2005.
-
(2005)
Journal on Selected Areas in Communication
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
9
-
-
34547689144
-
Security analysis of routing protocol for MANET based on BAN logic
-
Apr
-
Y. L. Wang, J. Z. Wang, and M. Q. Wang, "Security analysis of routing protocol for MANET based on BAN logic," Journal on Communications, vol. 26, no. 4, pp. 125-129, Apr. 2005.
-
(2005)
Journal on Communications
, vol.26
, Issue.4
, pp. 125-129
-
-
Wang, Y.L.1
Wang, J.Z.2
Wang, M.Q.3
-
10
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
15
-
-
0025405980
-
A critique of the Burrows, Abadi, and Needham logic
-
D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," ACM Operating Systems Review, vol. 24, no. 2, pp. 35-38, 1990.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
16
-
-
0036045935
-
BAN-like logic for cryptographic protocols analysis: A survey
-
Y.Q. Zhang, J. P. Wu, and X. Li, "BAN-like logic for cryptographic protocols analysis: a survey," Journal of Tsinghua University (Sci & Tech), vol. 42, no. 1, pp. 96-99, 2002.
-
(2002)
Journal of Tsinghua University (Sci & Tech)
, vol.42
, Issue.1
, pp. 96-99
-
-
Zhang, Y.Q.1
Wu, J.P.2
Li, X.3
-
17
-
-
0034434717
-
The model and its defects of BAN family of logic
-
Dec
-
J. Z. Xu, Y. X. Dai, and Y.N. Zuo, "The model and its defects of BAN family of logic," Journal of Software, vol. 1, no. 12, pp. 1660-1665, Dec. 2000.
-
(2000)
Journal of Software
, vol.1
, Issue.12
, pp. 1660-1665
-
-
Xu, J.Z.1
Dai, Y.X.2
Zuo, Y.N.3
-
18
-
-
2342542981
-
Nonmonotonic cryptographic protocols,
-
Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI
-
A.D. Rubin, "Nonmonotonic cryptographic protocols," Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI, 1994.
-
(1994)
-
-
Rubin, A.D.1
-
19
-
-
0031386327
-
Extending NCP for protocols using public keys
-
Mar
-
A. D. Rubin, "Extending NCP for protocols using public keys," Mobile Networks and Applications, vol. 2, no. 3, pp. 227-241, Mar. 1997.
-
(1997)
Mobile Networks and Applications
, vol.2
, Issue.3
, pp. 227-241
-
-
Rubin, A.D.1
-
20
-
-
33745689203
-
Accountability in electronic commerce protocols
-
R. Kailar "Accountability in electronic commerce protocols," IEEE Trans. Software Engineering, vol. 22, no. 5, pp. 313-328, 1996.
-
(1996)
IEEE Trans. Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
21
-
-
0000260312
-
Limitations of Kailar Logic
-
Dec
-
D. C. Zhou, S. H. Qing, and Z. F. Zhou, "Limitations of Kailar Logic," Journal of Software, vol. 10, no. 12, pp. 1238-1245, Dec. 1999.
-
(1999)
Journal of Software
, vol.10
, Issue.12
, pp. 1238-1245
-
-
Zhou, D.C.1
Qing, S.H.2
Zhou, Z.F.3
-
22
-
-
0035467046
-
A new approach for the analysis of electronic commerce protocols
-
Sept
-
D. C. Zhou, S. H. Qing, and Z. F. Zhou, "A new approach for the analysis of electronic commerce protocols," Journal of Software, vol. 12, no. 9, pp. 1318-1328, Sept. 2001.
-
(2001)
Journal of Software
, vol.12
, Issue.9
, pp. 1318-1328
-
-
Zhou, D.C.1
Qing, S.H.2
Zhou, Z.F.3
|