-
1
-
-
26444497860
-
-
A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami and S. K. Rajamani, editors, CAV, 3576 of Lecture Notes in Computer Science, pages 281-285. Springer, 2005.
-
A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami and S. K. Rajamani, editors, CAV, volume 3576 of Lecture Notes in Computer Science, pages 281-285. Springer, 2005.
-
-
-
-
2
-
-
33745824225
-
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
-
L. Aceto and A. Ingólfsdóttir, editors, FoSSaCS, of, Springer
-
M. Backes, S. Mödersheim, B. Pfitzmann, and L. Viganò. Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In L. Aceto and A. Ingólfsdóttir, editors, FoSSaCS, volume 3921 of Lecture Notes in Computer Science, pages 428-445. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3921
, pp. 428-445
-
-
Backes, M.1
Mödersheim, S.2
Pfitzmann, B.3
Viganò, L.4
-
3
-
-
14844303360
-
Verifying policy-based security for web services
-
V. Atluri, B. Pfitzmann, and P. D. McDaniel, editors, ACM
-
K. Bhargavan, C. Fournet, and A. D. Gordon. Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, and P. D. McDaniel, editors, ACM Conference on Computer and Communications Security, pages 268-277. ACM, 2004.
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 268-277
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
IEEE Computer Society
-
H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, page 197. IEEE Computer Society, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
5
-
-
23144433992
-
A high level protocol specification language for industrial security-sensitive protocols
-
Y. Chevalier, L. Compagna, J. Cuéllar, P. H. Drielsma, J. Mantovani, S. Mödersheim, and L. Vigneron. A high level protocol specification language for industrial security-sensitive protocols. In Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS), pages 193-205, 2004.
-
(2004)
Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS)
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuéllar, J.3
Drielsma, P.H.4
Mantovani, J.5
Mödersheim, S.6
Vigneron, L.7
-
7
-
-
0019649307
-
On the security of public key protocols
-
IEEE
-
D. Dolev and A. C.-C. Yao. On the security of public key protocols. In FOCS, pages 350-357. IEEE, 1981.
-
(1981)
FOCS
, pp. 350-357
-
-
Dolev, D.1
Yao, A.C.-C.2
-
9
-
-
37049030912
-
A security protocol animator tool for AVISPA
-
Pisa, May
-
Y. Glouche, T. Genet, O. Heen, and O. Courtay. A security protocol animator tool for AVISPA. In ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa, May 2006.
-
(2006)
ARTIST2 Workshop on Security Specification and Verification of Embedded Systems
-
-
Glouche, Y.1
Genet, T.2
Heen, O.3
Courtay, O.4
-
10
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA, November 3-5, ACM
-
C. Karlof, N. Sastry, and D. Wagner. TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Baltimore, MD, USA, November 3-5, 2004, pages 162-175. ACM, 2004.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
11
-
-
3042686296
-
Formal verification of pap and eap-md5 protocols in wireless networks: Fdr model checking
-
02:264
-
I.-G. Kim and J.-Y. Choi. Formal verification of pap and eap-md5 protocols in wireless networks: Fdr model checking. aina, 02:264, 2004.
-
(2004)
aina
-
-
Kim, I.-G.1
Choi, J.-Y.2
-
12
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1-2):53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
14
-
-
33745787568
-
-
J. C. Mitchell. Finite-state analysis of security protocols. In A. J. Hu and M. Y. Vardi, editors, CAV, 1427 of Lecture Notes in Computer Science, pages 71-76. Springer, 1998.
-
J. C. Mitchell. Finite-state analysis of security protocols. In A. J. Hu and M. Y. Vardi, editors, CAV, volume 1427 of Lecture Notes in Computer Science, pages 71-76. Springer, 1998.
-
-
-
-
15
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. A. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.A.2
Wagner, D.3
-
16
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
18
-
-
33646140557
-
Application of formal methods to the analysis of web services security
-
M. Bravetti, L. Kloul, and G. Zavattaro, editors, EPEW/WS-FM, of, Springer
-
M. L. Tobarra, D. Cazorla, F. Cuartero, and G. Diaz. Application of formal methods to the analysis of web services security. In M. Bravetti, L. Kloul, and G. Zavattaro, editors, EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, pages 215-229. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3670
, pp. 215-229
-
-
Tobarra, M.L.1
Cazorla, D.2
Cuartero, F.3
Diaz, G.4
-
19
-
-
37049022035
-
Formal verification of TLS handshake and extensions for wireless networks
-
San Sebastian, Spain, February, IADIS Press
-
M. L. Tobarra, D. Cazorla, F. Cuartero, and G. Diaz. Formal verification of TLS handshake and extensions for wireless networks. In Proc. of IADIS International Conference on Applied Computing (AC'06), pages 57-64, San Sebastian, Spain, February 2006. IADIS Press.
-
(2006)
Proc. of IADIS International Conference on Applied Computing (AC'06)
, pp. 57-64
-
-
Tobarra, M.L.1
Cazorla, D.2
Cuartero, F.3
Diaz, G.4
-
20
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
S. Setia and V. Swarup, editors, ACM
-
R. J. Watro, D. Kong, S.-f. Cuti, C. Gardiner, C. Lynn, and P. Kruus. TinyPK: securing sensor networks with public key technology. In S. Setia and V. Swarup, editors, SASN, pages 59-64. ACM, 2004.
-
(2004)
SASN
, pp. 59-64
-
-
Watro, R.J.1
Kong, D.2
Cuti, S.-F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
21
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Jajodia, V. Atluri, and T. Jaeger, editors, ACM
-
S. Zhu, S. Setia, and S. Jajodia. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In S. Jajodia, V. Atluri, and T. Jaeger, editors, ACM Conference on Computer and Communications Security, pages 62-72. ACM, 2003.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
22
-
-
33847120377
-
LEAP : Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia. LEAP : Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2(4):500-528, 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|