-
1
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 6, 46-55 (1999)
-
(1999)
IEEE Personal Communications
, vol.6
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.-K.2
-
2
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Hu, Y.C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security & Privacy 2, 28-39 (2004)
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 28-39
-
-
Hu, Y.C.1
Perrig, A.2
-
4
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Djenouri, D., Khelladi, L., Badache, A.N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials 7, 2-28 (2005)
-
(2005)
IEEE Communications Surveys & Tutorials
, vol.7
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
5
-
-
54249101364
-
Surveying Security Analysis Techniques in MANET Routing Protocols
-
Andel, T.R., Yasinsac, A.: Surveying Security Analysis Techniques in MANET Routing Protocols. IEEE Communications Surveys & Tutorials 9, 70-84 (2007)
-
(2007)
IEEE Communications Surveys & Tutorials
, vol.9
, pp. 70-84
-
-
Andel, T.R.1
Yasinsac, A.2
-
8
-
-
35048830853
-
Automatized Verification of Ad Hoc Routing Protocols
-
de Frutos-Escrig, D, Nüñez, M, eds, FORTE 2004, Springer, Heidelberg
-
Wibling, O., Parrow, J., Pears, A.: Automatized Verification of Ad Hoc Routing Protocols. In: de Frutos-Escrig, D., Nüñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 343-358. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3235
, pp. 343-358
-
-
Wibling, O.1
Parrow, J.2
Pears, A.3
-
9
-
-
0346263728
-
Formal verification of standards for distance vector routing protocols
-
Bhargavan, K., Obradovic. D., Gunter. C.A.: Formal verification of standards for distance vector routing protocols. Journal of the ACM 49, 538-576 (2002)
-
(2002)
Journal of the ACM
, vol.49
, pp. 538-576
-
-
Bhargavan, K.1
Obradovic, D.2
Gunter, C.A.3
-
10
-
-
54249154766
-
-
Andel, T.R., Yasinsac, A.: Automated Security Analysis of Ad Hoc Routing Protocols Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA 2007), Wroclaw, Poland, pp. 9-26 (2007)
-
Andel, T.R., Yasinsac, A.: Automated Security Analysis of Ad Hoc Routing Protocols Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA 2007), Wroclaw, Poland, pp. 9-26 (2007)
-
-
-
-
11
-
-
17444426121
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Hu, Y.-C, Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11, 21-38 (2005)
-
(2005)
Wireless Networks
, vol.11
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
85008543309
-
Provably secure on-demand source routing in mobile ad hoc networks
-
Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 5, 1533-1546 (2006)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, pp. 1533-1546
-
-
Ács, G.1
Buttyán, L.2
Vajda, I.3
-
15
-
-
25144473813
-
Secure Multipath Routing for Mobile Ad Hoc Networks
-
Kotzanikolaou, P., Mavropodi, R., Douligeris, C: Secure Multipath Routing for Mobile Ad Hoc Networks. In: Second Annual Conference on Wireless On-demand Network Systems and Services (WONS 2005), pp. 89-96 (2005)
-
(2005)
Second Annual Conference on Wireless On-demand Network Systems and Services (WONS
, pp. 89-96
-
-
Kotzanikolaou, P.1
Mavropodi, R.2
Douligeris, C.3
-
16
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
ACM Press, Atlanta
-
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: 3rd ACM Workshop on Wireless Security, pp. 21-30. ACM Press, Atlanta (2002)
-
(2002)
3rd ACM Workshop on Wireless Security
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
17
-
-
0000289556
-
Formal methods: State of the art and future directions
-
Clarke, E.M., Wing, J.M.: Formal methods: state of the art and future directions. ACM Computing Surveys 28, 626-643 (1996)
-
(1996)
ACM Computing Surveys
, vol.28
, pp. 626-643
-
-
Clarke, E.M.1
Wing, J.M.2
-
18
-
-
0003962322
-
-
MIT Press, Cambridge
-
Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)
-
(1999)
Model Checking
-
-
Clarke, E.M.1
Grumberg, O.2
Peled, D.A.3
-
19
-
-
0030084918
-
The NRL Protocol Analyzer: An Overview
-
Meadows, C.: The NRL Protocol Analyzer: An Overview. The Journal of Logic Programming 26, 113-131 (1996)
-
(1996)
The Journal of Logic Programming
, vol.26
, pp. 113-131
-
-
Meadows, C.1
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
Song, D., Berezin, S., Perrig, A.: Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9, 47-74 (2001)
-
(2001)
Journal of Computer Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
22
-
-
33750440529
-
A framework for security analysis of mobile wireless networks
-
Nanz, S., Hankin, C.: A framework for security analysis of mobile wireless networks. Theoretical Computer Science 367, 203-227 (2006)
-
(2006)
Theoretical Computer Science
, vol.367
, pp. 203-227
-
-
Nanz, S.1
Hankin, C.2
-
24
-
-
84893561028
-
Using SPIN to Verify Security Properties of Cryptographic Protocols
-
Bošnački, D, Leue, S, eds, SPIN, Springer, Heidelberg
-
Maggi, P., Sisto, R.: Using SPIN to Verify Security Properties of Cryptographic Protocols. In: Bošnački, D., Leue, S. (eds.) SPIN 2002. LNCS, vol. 2318, pp. 187-204. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2318
, pp. 187-204
-
-
Maggi, P.1
Sisto, R.2
-
25
-
-
0013451778
-
-
Department of Computer Science. University of Twente, Deventer, The Netherlands
-
Ruys, T.C.: Towards effective model checking. Department of Computer Science. University of Twente, Deventer, The Netherlands (2001)
-
(2001)
Towards effective model checking
-
-
Ruys, T.C.1
-
26
-
-
34547650617
-
The Invisible Node Attack Revisited
-
Richmond
-
Andel, T.R., Yasinsac, A.: The Invisible Node Attack Revisited, pp. 686-691. IEEE SoutheastCon, Richmond (2007)
-
(2007)
IEEE SoutheastCon
, pp. 686-691
-
-
Andel, T.R.1
Yasinsac, A.2
|