메뉴 건너뛰기




Volumn , Issue , 2009, Pages 109-123

Modeling and verifying physical properties of security protocols for wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

BROADCAST AUTHENTICATION; COMMUNICATION CAPABILITIES; COMMUNICATION MEDIUM; DISTANCE BOUNDING; DOLEV-YAO INTRUDERS; FORMAL MODEL; ISABELLE/HOL; MESSAGE TRANSMISSIONS; PHYSICAL CONSTRAINTS; SECURITY PROTOCOLS;

EID: 70350525196     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2009.6     Document Type: Conference Paper
Times cited : (33)

References (41)
  • 1
    • 85008543309 scopus 로고    scopus 로고
    • Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
    • G. Acs, L. Buttyan, and I. Vajda, "Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1533-1546, 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11 , pp. 1533-1546
    • Acs, G.1    Buttyan, L.2    Vajda, I.3
  • 2
    • 0028413052 scopus 로고
    • A Theory of Timed Automata
    • R. Alur and D. Dill, "A Theory of Timed Automata," Theoretical Computer Science, vol. 126, no. 2, pp. 183-235, 1994.
    • (1994) Theoretical Computer Science , vol.126 , Issue.2 , pp. 183-235
    • Alur, R.1    Dill, D.2
  • 3
    • 35048888740 scopus 로고    scopus 로고
    • Proving correctness of the basic TESLA multicast stream authentication protocol with TAME
    • M. Archer, "Proving correctness of the basic TESLA multicast stream authentication protocol with TAME," in Workshop on Issues in the Theory of Security, 2002, pp. 14-15.
    • (2002) Workshop on Issues in the Theory of Security , pp. 14-15
    • Archer, M.1
  • 7
    • 33749582048 scopus 로고    scopus 로고
    • C. Ballarin, Interpretation of locales in Isabelle: Theories and proof contexts, Mathematical Knowledge Management (MKM 2006), LNAI, 4108, 2006.
    • C. Ballarin, "Interpretation of locales in Isabelle: Theories and proof contexts," Mathematical Knowledge Management (MKM 2006), LNAI, vol. 4108, 2006.
  • 17
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • Berkeley, CA, USA: USENIX Association
    • S. Drimer and S. J. Murdoch, "Keep your enemies close: distance bounding against smartcard relay attacks," in Usenix '07: Proceedings of 16th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2007, pp. 1-16.
    • (2007) Usenix '07: Proceedings of 16th USENIX Security Symposium , pp. 1-16
    • Drimer, S.1    Murdoch, S.J.2
  • 22
    • 70350530552 scopus 로고    scopus 로고
    • Analysing a stream authentication protocol using model checking
    • P. J. Hopcroft and G. Lowe, "Analysing a stream authentication protocol using model checking," International Journal of Information Security, vol. 3, no. 1, pp. 2-13, 2004.
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 2-13
    • Hopcroft, P.J.1    Lowe, G.2
  • 23
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFO-COM '03, vol. 3, 2003, pp. 1976-1986.
    • (2003) INFO-COM '03 , vol.3 , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 27
    • 33750440529 scopus 로고    scopus 로고
    • A framework for security analysis of mobile wireless networks
    • S. Nanz and C. Hankin, "A framework for security analysis of mobile wireless networks," Theoretical Computer Science, vol. 367, no. 1, pp. 203-227, 2006.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1 , pp. 203-227
    • Nanz, S.1    Hankin, C.2
  • 30
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson, "The inductive approach to verifying cryptographic protocols," Journal of Computer Security, vol. 6, pp. 85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 31
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA Broadcast Authentication Protocol
    • A. Perrig, R. Canetti, J. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," RSA CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002.
    • (2002) RSA CryptoBytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, J.3    Song, D.4
  • 33
    • 70350558603 scopus 로고    scopus 로고
    • B. Porter, Cauchy's mean theorem and the cauchy-schwarz inequality, in The Archive of Formal Proofs, G. Klein, T. Nipkow, and L. Paulson, Eds. http://afp.sf.net/entries/Cauchy.shtml, Mar. 2006, formal proof development.
    • B. Porter, "Cauchy's mean theorem and the cauchy-schwarz inequality," in The Archive of Formal Proofs, G. Klein, T. Nipkow, and L. Paulson, Eds. http://afp.sf.net/entries/Cauchy.shtml, Mar. 2006, formal proof development.
  • 39
    • 38349047971 scopus 로고    scopus 로고
    • Secure Verification of Location Claims with Simultaneous Distance Modification
    • V. Shmatikov and M. Wang, "Secure Verification of Location Claims with Simultaneous Distance Modification," Lecture Notes in Computer Science, vol. 4846, p. 181, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4846 , pp. 181
    • Shmatikov, V.1    Wang, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.