-
1
-
-
84976295016
-
Distance-bounding protocols
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
2
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
ACM Press, New York
-
Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32. ACM Press, New York (2003)
-
(2003)
SASN 2003: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 21-32
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
3
-
-
33847329743
-
An RFID distance bounding protocol
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: SECURECOMM 2005: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington, DC, USA, pp. 67-73. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
SECURECOMM 2005: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
4
-
-
84882715141
-
Distance bounding protocols: Authentication logic analysis and collusion attacks
-
Springer, Heidelberg
-
Meadows, C., Poovendran, R., Pavlovic, D., Chang, L., Syverson, P.: Distance bounding protocols: Authentication logic analysis and collusion attacks. In: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, pp. 279-298. Springer, Heidelberg (2006)
-
(2006)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
, pp. 279-298
-
-
Meadows, C.1
Poovendran, R.2
Pavlovic, D.3
Chang, L.4
Syverson, P.5
-
5
-
-
1542317849
-
Secure verification of location claims
-
ACM Press, New York
-
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: WiSe 2003: Proceedings of the 2003 ACM workshop on Wireless security, pp. 1-10. ACM Press, New York (2003)
-
(2003)
WiSe 2003: Proceedings of the 2003 ACM workshop on Wireless security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
6
-
-
70350525196
-
Modeling and verifying physical properties of security protocols for wireless networks
-
to appear
-
Schaller, P., Schmidt, B., Basin, D., Capkun, S.: Modeling and verifying physical properties of security protocols for wireless networks. In: CSF-22: 22nd IEEE Computer Security Foundations Symposium (to appear, 2009)
-
(2009)
CSF-22: 22nd IEEE Computer Security Foundations Symposium
-
-
Schaller, P.1
Schmidt, B.2
Basin, D.3
Capkun, S.4
-
7
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85-128 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
8
-
-
70350268653
-
-
Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, 2283. Springer, Heidelberg (2002)
-
Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, vol. 2283. Springer, Heidelberg (2002)
-
-
-
-
9
-
-
25844439422
-
-
INFOCOM, pp, IEEE, Los Alamitos
-
Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM, pp. 1917-1928. IEEE, Los Alamitos (2005)
-
(2005)
Secure positioning of wireless devices with application to sensor networks
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.P.2
-
11
-
-
33749582048
-
-
Ballarin, C.: Interpretation of locales in Isabelle: Theories and proof contexts. In: Borwein, J.M., Farmer, W.M. (eds.) MKM 2006. LNCS (LNAI), 4108, pp. 31-43. Springer, Heidelberg (2006)
-
Ballarin, C.: Interpretation of locales in Isabelle: Theories and proof contexts. In: Borwein, J.M., Farmer, W.M. (eds.) MKM 2006. LNCS (LNAI), vol. 4108, pp. 31-43. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
84876367662
-
-
Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, pp. 83-97. Springer, Heidelberg (2006)
-
Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 83-97. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
35048864876
-
Automatic Verification of Time Sensitive Cryptographic Protocols
-
Jensen, K, Podelski, A, eds, TACAS 2004, Springer, Heidelberg
-
Delzanno, G., Ganty, P.: Automatic Verification of Time Sensitive Cryptographic Protocols. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 342-356. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2988
, pp. 342-356
-
-
Delzanno, G.1
Ganty, P.2
-
16
-
-
84944070422
-
Analysing Time Dependent Security Properties in CSP Using PVS
-
Cuppens, F, Deswarte, Y, Gollmann, D, Waidner, M, eds, ESORICS 2000, Springer, Heidelberg
-
Evans, N., Schneider, S.: Analysing Time Dependent Security Properties in CSP Using PVS. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 222-237. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1895
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
17
-
-
85008543309
-
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
-
Acs, G., Buttyan, L., Vajda, I.: Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 5(11), 1533-1546 (2006)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Acs, G.1
Buttyan, L.2
Vajda, I.3
-
20
-
-
33750145458
-
Defining functions on equivalence classes
-
Paulson, L.: Defining functions on equivalence classes. ACM Transactions on Computational Logic 7(4), 658-675 (2006)
-
(2006)
ACM Transactions on Computational Logic
, vol.7
, Issue.4
, pp. 658-675
-
-
Paulson, L.1
-
21
-
-
70350288062
-
-
Basin, D., Constable, R.: Metalogical frameworks. In: Huet, G., Plotkin, G. (eds.) Logical Environments, pp. 1-29. Cambridge University Press, Cambridge (1993); Also available as Technical Report MPI-I-92-205
-
Basin, D., Constable, R.: Metalogical frameworks. In: Huet, G., Plotkin, G. (eds.) Logical Environments, pp. 1-29. Cambridge University Press, Cambridge (1993); Also available as Technical Report MPI-I-92-205
-
-
-
-
22
-
-
3142684246
-
Logical frameworks
-
Gabbay, D, Guenthner, F, eds, 2nd edn, Kluwer Academic Publishers, Dordrecht
-
Basin, D., Matthews, S.: Logical frameworks. In: Gabbay, D., Guenthner, F. (eds.) Handbook of Philosophical Logic, 2nd edn., vol. 9, pp. 89-164. Kluwer Academic Publishers, Dordrecht (2002)
-
(2002)
Handbook of Philosophical Logic
, vol.9
, pp. 89-164
-
-
Basin, D.1
Matthews, S.2
-
23
-
-
0034634021
-
Structuring metatheory on inductive definitions
-
October/November
-
Basin, D., Matthews, S.: Structuring metatheory on inductive definitions. Information and Computation 162(1-2) (October/November 2000)
-
(2000)
Information and Computation
, vol.162
, Issue.1-2
-
-
Basin, D.1
Matthews, S.2
|