-
1
-
-
0037086890
-
Wireless Sensor Networks: A Survey
-
March
-
I. Akyildiz, W. Su, Y, Sankarasubramaniam, and E.Cayirci. Wireless Sensor Networks: A Survey. Computer Networks, 38(4), March 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
26444497860
-
The AVISPA Tool for the automated validation of internet security protocols and applications
-
Edinburgh, Scotland, Springer-Verlag
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. S. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA Tool for the automated validation of internet security protocols and applications. In CAV'2005, Edinburgh, Scotland, 2005. Springer-Verlag.
-
(2005)
CAV'2005
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.S.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
3
-
-
0036039066
-
The SLAM project: Debugging system software via static analysis
-
New York, NY, USA, ACM Press
-
T. Ball and S. K. Rajamani. The SLAM project: debugging system software via static analysis. In POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 1-3, New York, NY, USA, 2002. ACM Press.
-
(2002)
POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 1-3
-
-
Ball, T.1
Rajamani, S.K.2
-
4
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
Washington, DC, USA, IEEE Computer Society
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In CSFW '06: Proceedings of the 19th IEEE Workshop on Computer Security Foundations, pages 139-152, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
CSFW '06: Proceedings of the 19th IEEE Workshop on Computer Security Foundations
, pp. 139-152
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
5
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
7
-
-
0025388480
-
A security scheme for resource sharing over a network
-
J. Burns and C. J. Mitchell. A security scheme for resource sharing over a network. Comput. Secur., 9(1):67-75, 1990.
-
(1990)
Comput. Secur
, vol.9
, Issue.1
, pp. 67-75
-
-
Burns, J.1
Mitchell, C.J.2
-
8
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Trans. Comput. Syst., 8(1):18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
9
-
-
4244142012
-
Formal methods in the design of cryptographic protocols (state of the art)
-
Technical Report SSC/1999/38, Swiss Federal Institute of Technology EPFL, nov
-
L. Buttyan. Formal methods in the design of cryptographic protocols (state of the art). Technical Report SSC/1999/38, Swiss Federal Institute of Technology (EPFL), nov 1999.
-
(1999)
-
-
Buttyan, L.1
-
10
-
-
23144433992
-
A high-level protocol specification language for industrial security-sensitive protocols
-
Y Chevalier, L. Compagna, J. Cuellar, P. H. Drielsma, J. Mantovani, S. Modersheim, and L. Vigneron. A high-level protocol specification language for industrial security-sensitive protocols. In SAPS, pages 193-205, 2004.
-
(2004)
SAPS
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuellar, J.3
Drielsma, P.H.4
Mantovani, J.5
Modersheim, S.6
Vigneron, L.7
-
11
-
-
33749545831
-
Verification by network decomposition
-
Springer-Verlag
-
E. Clarke, M. Talupur, T. Touili, and H. Veith. Verification by network decomposition. In Fifteenth International Conference on Concurrency Theory (CONCUR 04), pages 276-291. Springer-Verlag, 2004.
-
(2004)
Fifteenth International Conference on Concurrency Theory (CONCUR 04)
, pp. 276-291
-
-
Clarke, E.1
Talupur, M.2
Touili, T.3
Veith, H.4
-
12
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
New York, NY, USA, ACM Press
-
J. C. Corbett, M. B. Dwyer, J. Hatcliff, S. Laubach, C. S. Preanu, Robby, and H. Zheng. Bandera: extracting finite-state models from Java source code. In ICSE '00: Proceedings of the 22nd international conference on Software engineering, pages 439-448, New York, NY, USA, 2000. ACM Press.
-
(2000)
ICSE '00: Proceedings of the 22nd international conference on Software engineering
, pp. 439-448
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Laubach, S.4
Preanu, C.S.5
Robby6
Zheng, H.7
-
13
-
-
0020720357
-
On the security of public key protocols
-
mar
-
D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12): 198-208, mar 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
14
-
-
0003962322
-
-
MIT Press, Cambridge, MA, USA
-
J. Edmund M. Clarke, O. Grumberg, and D. A. Peled. Model checking. MIT Press, Cambridge, MA, USA, 1999.
-
(1999)
Model checking
-
-
Edmund, J.1
Clarke, M.2
Grumberg, O.3
Peled, D.A.4
-
15
-
-
0037702249
-
The nesC language: A holistic approach to networked embedded systems
-
D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler. The nesC language: A holistic approach to networked embedded systems. In PLDI '03: Proceedings of the 2003 conference on Programming language design and implementation, pages 1-11, 2003.
-
(2003)
PLDI '03: Proceedings of the 2003 conference on Programming language design and implementation
, pp. 1-11
-
-
Gay, D.1
Levis, P.2
von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
16
-
-
0030651806
-
Model checking for programming languages using verisoft
-
New York, NY, USA, ACM Press
-
P. Godefroid. Model checking for programming languages using verisoft. In POPL '97: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 174 - 186, New York, NY, USA, 1997. ACM Press.
-
(1997)
POPL '97: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 174-186
-
-
Godefroid, P.1
-
17
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
R. Cousot, editor, VMCAI'05, of, Paris, France, Jan, Springer
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In R. Cousot, editor, VMCAI'05, volume 3385 of Lecture Notes in Computer Science, pages 363-379, Paris, France, Jan. 2005. Springer.
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
18
-
-
56749168682
-
Slede: Event-based specification of sensor network security protocols
-
Y. Hanna and H. Rajan. Slede: event-based specification of sensor network security protocols. SIGSOFT Softw. Eng. Notes, 31(6): 1-2, 2006.
-
(2006)
SIGSOFT Softw. Eng. Notes
, vol.31
, Issue.6
, pp. 1-2
-
-
Hanna, Y.1
Rajan, H.2
-
19
-
-
19144362424
-
-
K. Havelund and G. Rosu. Monitoring Java programs with Java PathExplorer. In K. Havelund and G. Roşu, editors, Runtime Verification, 55 of Electronic Notes in Theoretical Computer Science. Elsevier, 23July 2001.
-
K. Havelund and G. Rosu. Monitoring Java programs with Java PathExplorer. In K. Havelund and G. Roşu, editors, Runtime Verification, volume 55 of Electronic Notes in Theoretical Computer Science. Elsevier, 23July 2001.
-
-
-
-
20
-
-
0036041563
-
Lazy abstraction
-
New York, NY, USA, ACM Press
-
T A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Lazy abstraction. In POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 58-70, New York, NY, USA, 2002. ACM Press.
-
(2002)
POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
21
-
-
0003406298
-
-
Prentice-Hall, Inc, Upper Saddle River, NJ, USA
-
G. J. Holzmann. Design and validation of computer protocols. Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1991.
-
(1991)
Design and validation of computer protocols
-
-
Holzmann, G.J.1
-
23
-
-
18944390941
-
The model checker SPIN
-
G. J. Holzmann. The model checker SPIN. IEEE Trans. Softw. Eng., 23(5):279-295, 1997.
-
(1997)
IEEE Trans. Softw. Eng
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
25
-
-
0024665744
-
Analyzing encryption protocols using formal verification techniques
-
may
-
R. A. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, may 1989.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.A.1
-
26
-
-
18844399081
-
Tossim: Accurate and scalable simulation of entire tinyos applications
-
New York, NY, USA, ACM Press
-
P. Levis, N. Lee, M. Welsh, and D. Culler. Tossim: accurate and scalable simulation of entire tinyos applications. In SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems, pages 126-137, New York, NY, USA, 2003. ACM Press.
-
(2003)
SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
28
-
-
0026837069
-
An automatic search for security flaws in key management schemes
-
D. Longley and S. Rigby. An automatic search for security flaws in key management schemes. Comput. Secur., 11(1):75-89, 1992.
-
(1992)
Comput. Secur
, vol.11
, Issue.1
, pp. 75-89
-
-
Longley, D.1
Rigby, S.2
-
31
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2): 113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
33
-
-
0023295108
-
The interrogator: Protocol security analysis
-
J. K. Millen, S. C. Clark, and S. B. Freeman. The interrogator: protocol security analysis. IEEE Trans. Softw. Eng., 13(2):274-288, 1987.
-
(1987)
IEEE Trans. Softw. Eng
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freeman, S.B.3
-
34
-
-
84978435516
-
Cmc: A pragmatic approach to model checking real code
-
36(SI):75-88
-
M. Musuvathi, D. Y W. Park, A. Chou, D. R. Engler, and D. L. Dill. Cmc: a pragmatic approach to model checking real code. SIGOPS Oper. Syst. Rev., 36(SI):75-88, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev
-
-
Musuvathi, M.1
Park, D.Y.W.2
Chou, A.3
Engler, D.R.4
Dill, D.L.5
-
35
-
-
56749164388
-
-
nesC Compiler. http://sourceforge.net/projects/nescc.
-
nesC Compiler. http://sourceforge.net/projects/nescc.
-
-
-
-
36
-
-
0002088427
-
A note on the use of timestamps as nonces
-
B. C. Neuman and S. G. Stubblebine. A note on the use of timestamps as nonces. SIGOPS Oper. Syst. Rev., 27(2): 10-14, 1993.
-
(1993)
SIGOPS Oper. Syst. Rev
, vol.27
, Issue.2
, pp. 10-14
-
-
Neuman, B.C.1
Stubblebine, S.G.2
-
37
-
-
0034771605
-
Spins: Security protocols for sensor netowrks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. Spins: security protocols for sensor netowrks. In Proceedings of ACM Mobile Computing and Networking (Mobicom'01), pages 189-199, 2001.
-
(2001)
Proceedings of ACM Mobile Computing and Networking (Mobicom'01)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
38
-
-
1542347185
-
Bogor: An extensible and highly-modular software model checking framework
-
New York, NY, USA, ACM Press
-
Robby, M. B. Dwyer, and J. Hatcliff. Bogor: an extensible and highly-modular software model checking framework. In ESEC/FSE-11, pages 267-276, New York, NY, USA, 2003. ACM Press.
-
(2003)
ESEC/FSE-11
, pp. 267-276
-
-
Robby, M.1
Dwyer, B.2
Hatcliff, J.3
-
40
-
-
24644523336
-
-
S. Schneider. Verifying authentication protocol implementations. In FMOODS '02: Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V, pages 5-24, Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B.V.
-
S. Schneider. Verifying authentication protocol implementations. In FMOODS '02: Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V, pages 5-24, Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B.V.
-
-
-
-
42
-
-
0032623470
-
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
-
P. G. Stefanos Gritzalis, Diomidis Spinellis. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications, 22(8):697-709, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 697-709
-
-
Stefanos Gritzalis, P.G.1
Spinellis, D.2
-
43
-
-
37049032133
-
Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP
-
WSAN'07, Albacete Spain, September, Springer
-
L. Tobarra, D. Cazorla, F. Cuartero, G. DÂaz, and E. Cambronero. Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP. In WSAN'07, pages 95-106, Albacete (Spain), September 2007. IFIP Main Series, Springer.
-
(2007)
IFIP Main Series
, pp. 95-106
-
-
Tobarra, L.1
Cazorla, D.2
Cuartero, F.3
DÂaz, G.4
Cambronero, E.5
-
44
-
-
0027735231
-
Extending cryptographic logics of belief to key agreement protocols
-
New York, NY, USA, ACM Press
-
P. van Oorschot. Extending cryptographic logics of belief to key agreement protocols. In CCS '93: Proceedings of the 1st ACM conference on Computer and communications security, pages 232-243, New York, NY, USA, 1993. ACM Press.
-
(1993)
CCS '93: Proceedings of the 1st ACM conference on Computer and communications security
, pp. 232-243
-
-
van Oorschot, P.1
|