-
1
-
-
85008543309
-
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
-
G. Acs, L. Buttyan, and I. Vajda, "Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1533-1546, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Acs, G.1
Buttyan, L.2
Vajda, I.3
-
2
-
-
0028413052
-
A Theory of Timed Automata
-
R. Alur and D. Dill, "A Theory of Timed Automata," Theoretical Computer Science, vol. 126, no. 2, pp. 183-235, 1994.
-
(1994)
Theoretical Computer Science
, vol.126
, Issue.2
, pp. 183-235
-
-
Alur, R.1
Dill, D.2
-
3
-
-
35048888740
-
Proving correctness of the basic TESLA multicast stream authentication protocol with TAME
-
M. Archer, "Proving correctness of the basic TESLA multicast stream authentication protocol with TAME," in Workshop on Issues in the Theory of Security, 2002, pp. 14-15.
-
(2002)
Workshop on Issues in the Theory of Security
, pp. 14-15
-
-
Archer, M.1
-
5
-
-
30144438857
-
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Com-pagna, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago et al., "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications," CAV '05: Proceedings of the 17th Conference on Computer Aided Verification, 2005.
-
(2005)
CAV '05: Proceedings of the 17th Conference on Computer Aided Verification
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Com-pagna, L.5
Mantovani, J.6
Mödersheim, S.7
von Oheimb, D.8
Rusinowitch, M.9
Santiago, J.10
-
7
-
-
33749582048
-
-
C. Ballarin, Interpretation of locales in Isabelle: Theories and proof contexts, Mathematical Knowledge Management (MKM 2006), LNAI, 4108, 2006.
-
C. Ballarin, "Interpretation of locales in Isabelle: Theories and proof contexts," Mathematical Knowledge Management (MKM 2006), LNAI, vol. 4108, 2006.
-
-
-
-
10
-
-
33144454801
-
Secure positioning in wireless networks
-
S. Capkun and J. Hubaux, "Secure positioning in wireless networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 221-232, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.2
-
11
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
New York, NY, USA: ACM Press
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "SECTOR: secure tracking of node encounters in multi-hop wireless networks," in SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York, NY, USA: ACM Press, 2003, pp. 21-32.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 21-32
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
12
-
-
34247391971
-
Integrity regions: Authentication through presence in wireless networks
-
York, NY, USA: ACM Press
-
S. Capkun and M. Cagalj, "Integrity regions: authentication through presence in wireless networks," in WiSe '06: Proceedings of the 5th ACM Workshop on Wireless Security. New York, NY, USA: ACM Press, 2006, pp. 1-10.
-
(2006)
WiSe '06: Proceedings of the 5th ACM Workshop on Wireless Security. New
, pp. 1-10
-
-
Capkun, S.1
Cagalj, M.2
-
13
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
Springer
-
J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore, "So near and yet so far: Distance-bounding attacks in wireless networks," in Security and Privacy in Ad-hoc and Sensor Networks. Springer, 2006, pp. 83-97.
-
(2006)
Security and Privacy in Ad-hoc and Sensor Networks
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
14
-
-
70350537291
-
Timed analysis of security protocols
-
R. Corin, S. Etalle, P. Hartel, and A. Mader, "Timed analysis of security protocols," Journal of Computer Security, vol. 15, no. 6, pp. 619-645, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.6
, pp. 619-645
-
-
Corin, R.1
Etalle, S.2
Hartel, P.3
Mader, A.4
-
16
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE, Transactions on Information Theory, no. 2(29), pp. 198-208, 1983.
-
(1983)
IEEE, Transactions on Information Theory
, Issue.2 29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
17
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
Berkeley, CA, USA: USENIX Association
-
S. Drimer and S. J. Murdoch, "Keep your enemies close: distance bounding against smartcard relay attacks," in Usenix '07: Proceedings of 16th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2007, pp. 1-16.
-
(2007)
Usenix '07: Proceedings of 16th USENIX Security Symposium
, pp. 1-16
-
-
Drimer, S.1
Murdoch, S.J.2
-
19
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
ACM Press
-
S. Ganeriwal, S. Capkun, C.-C. Han, and M. B. Srivastava, "Secure time synchronization service for sensor networks," in WiSe '05: Proceedings of the 4th ACM Workshop on Wireless Security. ACM Press, 2005, pp. 97-106.
-
(2005)
WiSe '05: Proceedings of the 4th ACM Workshop on Wireless Security
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
20
-
-
0345412612
-
Formal analysis of some timed security properties in wireless protocols
-
R. Gorrieri, F. Martinelli, M. Petrocchi, and A. Vaccarelli, "Formal analysis of some timed security properties in wireless protocols," in FMOODS '03: Proceedings of the 6th IFIP Workshop on Formal Methods for Open Object-based Distributed Systems, 2003, pp. 139-154.
-
(2003)
FMOODS '03: Proceedings of the 6th IFIP Workshop on Formal Methods for Open Object-based Distributed Systems
, pp. 139-154
-
-
Gorrieri, R.1
Martinelli, F.2
Petrocchi, M.3
Vaccarelli, A.4
-
21
-
-
33847329743
-
An RFID distance bounding protocol
-
Washington, DC, USA: IEEE Computer Society
-
G. P. Hancke and M. G. Kuhn, "An RFID distance bounding protocol," in SECURECOMM '05: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Washington, DC, USA: IEEE Computer Society, 2005, pp. 67-73.
-
(2005)
SECURECOMM '05: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
22
-
-
70350530552
-
Analysing a stream authentication protocol using model checking
-
P. J. Hopcroft and G. Lowe, "Analysing a stream authentication protocol using model checking," International Journal of Information Security, vol. 3, no. 1, pp. 2-13, 2004.
-
(2004)
International Journal of Information Security
, vol.3
, Issue.1
, pp. 2-13
-
-
Hopcroft, P.J.1
Lowe, G.2
-
23
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFO-COM '03, vol. 3, 2003, pp. 1976-1986.
-
(2003)
INFO-COM '03
, vol.3
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
25
-
-
33144472023
-
ROPE: Robust position estimation in wireless sensor networks
-
L. Lazos, R. Poovendran, and S. Capkun, "ROPE: robust position estimation in wireless sensor networks," IPSN 2005: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, 2005, pp. 324-331, 2005.
-
(2005)
IPSN 2005: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks
, pp. 324-331
-
-
Lazos, L.1
Poovendran, R.2
Capkun, S.3
-
26
-
-
84882715141
-
Distance bounding protocols: Authentication logic analysis and collusion attacks
-
C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, and P. Syverson, "Distance bounding protocols: Authentication logic analysis and collusion attacks," Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, pp. 279-298, 2006.
-
(2006)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
, pp. 279-298
-
-
Meadows, C.1
Poovendran, R.2
Pavlovic, D.3
Chang, L.4
Syverson, P.5
-
27
-
-
33750440529
-
A framework for security analysis of mobile wireless networks
-
S. Nanz and C. Hankin, "A framework for security analysis of mobile wireless networks," Theoretical Computer Science, vol. 367, no. 1, pp. 203-227, 2006.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1
, pp. 203-227
-
-
Nanz, S.1
Hankin, C.2
-
29
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad hoc networking
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J. Hubaux, "Secure neighborhood discovery: a fundamental element for mobile ad hoc networking," Communications Magazine, IEEE, vol. 46, no. 2, pp. 132-139, 2008.
-
(2008)
Communications Magazine, IEEE
, vol.46
, Issue.2
, pp. 132-139
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Capkun, S.6
Hubaux, J.7
-
30
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson, "The inductive approach to verifying cryptographic protocols," Journal of Computer Security, vol. 6, pp. 85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
31
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
A. Perrig, R. Canetti, J. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," RSA CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
33
-
-
70350558603
-
-
B. Porter, Cauchy's mean theorem and the cauchy-schwarz inequality, in The Archive of Formal Proofs, G. Klein, T. Nipkow, and L. Paulson, Eds. http://afp.sf.net/entries/Cauchy.shtml, Mar. 2006, formal proof development.
-
B. Porter, "Cauchy's mean theorem and the cauchy-schwarz inequality," in The Archive of Formal Proofs, G. Klein, T. Nipkow, and L. Paulson, Eds. http://afp.sf.net/entries/Cauchy.shtml, Mar. 2006, formal proof development.
-
-
-
-
34
-
-
58049188696
-
Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility
-
ACM
-
M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility," in ASIACCS '08: Proceedings of the 3nd ACM Symposium on Information, Computer and Communications Security. ACM, 2008, pp. 189-200.
-
(2008)
ASIACCS '08: Proceedings of the 3nd ACM Symposium on Information, Computer and Communications Security
, pp. 189-200
-
-
Poturalski, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
35
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
ACM
-
J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji, "Detecting relay attacks with timing-based protocols," in ASIACCS '07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. ACM, 2007, pp. 204-213.
-
(2007)
ASIACCS '07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
36
-
-
1542317849
-
Secure verification of location claims
-
New York, NY, USA: ACM Press
-
N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in WiSe '03: Proceedings of the 2003 ACM workshop on Wireless security. New York, NY, USA: ACM Press, 2003, pp. 1-10.
-
(2003)
WiSe '03: Proceedings of the 2003 ACM workshop on Wireless security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
37
-
-
38049035017
-
BAP: Broadcast authentication using cryptographic puzzles
-
P. Schaller, S. Capkun, and D. Basin, "BAP: Broadcast authentication using cryptographic puzzles," ACNS 2007: International Conference on Applied Cryptography and Network Security, vol. 4521, pp. 401-419, 2007.
-
(2007)
ACNS 2007: International Conference on Applied Cryptography and Network Security
, vol.4521
, pp. 401-419
-
-
Schaller, P.1
Capkun, S.2
Basin, D.3
-
39
-
-
38349047971
-
Secure Verification of Location Claims with Simultaneous Distance Modification
-
V. Shmatikov and M. Wang, "Secure Verification of Location Claims with Simultaneous Distance Modification," Lecture Notes in Computer Science, vol. 4846, p. 181, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4846
, pp. 181
-
-
Shmatikov, V.1
Wang, M.2
-
40
-
-
34547282118
-
TinySeRSync: Secure and resilient time synchronization in wireless sensor networks
-
K. Sun, P. Ning, and C. Wang, "TinySeRSync: secure and resilient time synchronization in wireless sensor networks," CCS '06: Proceedings of the 13th ACM conference on Computer and Communications Security, pp. 264-277, 2006.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and Communications Security
, pp. 264-277
-
-
Sun, K.1
Ning, P.2
Wang, C.3
-
41
-
-
4544302090
-
Modeling vulnerabilities of ad hoc routing protocols
-
New York, NY, USA: ACM
-
S. Yang and J. S. Baras, "Modeling vulnerabilities of ad hoc routing protocols," in SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York, NY, USA: ACM, 2003, pp. 12-20.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 12-20
-
-
Yang, S.1
Baras, J.S.2
|