메뉴 건너뛰기




Volumn , Issue , 2010, Pages 59-74

Modeling and verifying ad hoc routing protocols

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC ROUTING PROTOCOL; CONSTRAINT SOLVING; DECISION PROCEDURE; DETECTING ATTACKS; MALICIOUS NODES; MOBILE WIRELESS DEVICES; NETWORK TOPOLOGY; SECURITY PROTOCOLS; STANDARD SYMBOLIC MODEL; WIRELESS COMMUNICATIONS;

EID: 77957579306     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.12     Document Type: Conference Paper
Times cited : (14)

References (27)
  • 4
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • DOI 10.1016/S0304-3975(02)00090-7, PII S0304397502000907
    • R. Amadio, D. Lugiez, and V. Vanackère. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science, 290(1):695-740, 2002. (Pubitemid 35264438)
    • (2003) Theoretical Computer Science , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.M.1    Lugiez, D.2    Vanackere, V.3
  • 5
    • 26444497860 scopus 로고    scopus 로고
    • The AVISPA tool for the automated validation of internet security protocols and applications
    • Springer, Volume 3576 of LNCS
    • A. Armando et al. The AVISPA Tool for the automated validation of internet security protocols and applications. In Proc. 17th International Conference on Computer Aided Verification, CAV'2005, volume 3576 of LNCS, pages 281- 285. Springer, 2005.
    • (2005) Proc. 17th International Conference on Computer Aided Verification, CAV'2005 , pp. 281-285
    • Armando, A.1
  • 6
    • 77957600796 scopus 로고    scopus 로고
    • Modeling and verifying ad hoc routing protocols
    • Laboratoire Spécification et V́erification, ENS Cachan, France, Feb
    • M. Arnaud, V. Cortier, and S. Delaune. Modeling and verifying ad hoc routing protocols. Research Report LSV-10- 03, Laboratoire Spécification et V́erification, ENS Cachan, France, Feb. 2010. 36 pages.
    • (2010) Research Report LSV-10- 03 , pp. 36
    • Arnaud, M.1    Cortier, V.2    Delaune, S.3
  • 13
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on- demand routing protocol for Ad Hoc networks
    • January
    • Y.-C. Hu, A. Perrig, and D. Johnson. Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks. Wireless Networks, 11, January 2005.
    • (2005) Wireless Networks , vol.11
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 15
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multi-hop wireless Ad hoc networks
    • D. Johnson, D. Maltz, and J. Broch. DSR: The Dynamic Source Routing Protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking, pages 139-172, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.1    Maltz, D.2    Broch, J.3
  • 16
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
    • edited by Charles E. Perkins, Chapter 5, Addison-Wesley
    • D. B. Johnson, D. A. Maltz, and J. Broch. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In In Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pages 139-172. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 19
    • 33750440529 scopus 로고    scopus 로고
    • A framework for security analysis of mobile wireless networks
    • S. Nanz and C. Hankin. A Framework for Security Analysis of Mobile Wireless Networks. Theoretical Computer Science, 367(1):203-227, 2006.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1 , pp. 203-227
    • Nanz, S.1    Hankin, C.2
  • 21
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85- 128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.