-
4
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
DOI 10.1016/S0304-3975(02)00090-7, PII S0304397502000907
-
R. Amadio, D. Lugiez, and V. Vanackère. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science, 290(1):695-740, 2002. (Pubitemid 35264438)
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.M.1
Lugiez, D.2
Vanackere, V.3
-
5
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Springer, Volume 3576 of LNCS
-
A. Armando et al. The AVISPA Tool for the automated validation of internet security protocols and applications. In Proc. 17th International Conference on Computer Aided Verification, CAV'2005, volume 3576 of LNCS, pages 281- 285. Springer, 2005.
-
(2005)
Proc. 17th International Conference on Computer Aided Verification, CAV'2005
, pp. 281-285
-
-
Armando, A.1
-
6
-
-
77957600796
-
Modeling and verifying ad hoc routing protocols
-
Laboratoire Spécification et V́erification, ENS Cachan, France, Feb
-
M. Arnaud, V. Cortier, and S. Delaune. Modeling and verifying ad hoc routing protocols. Research Report LSV-10- 03, Laboratoire Spécification et V́erification, ENS Cachan, France, Feb. 2010. 36 pages.
-
(2010)
Research Report LSV-10- 03
, pp. 36
-
-
Arnaud, M.1
Cortier, V.2
Delaune, S.3
-
9
-
-
14844337112
-
Towards provable security for Ad hoc routing protocols
-
New York, NY, USA, ACM
-
L. Buttyán and I. Vajda. Towards Provable Security for Ad Hoc Routing Protocols. In Proc. 2nd ACM workshop on Security of ad hoc and sensor networks (SASN'04), pages 94-105, New York, NY, USA, 2004. ACM.
-
(2004)
Proc. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04)
, pp. 94-105
-
-
Buttyán, L.1
Vajda, I.2
-
11
-
-
76249100283
-
Deciding security properties for cryptographic protocols. Application to key cycles
-
H. Comon-Lundh, V. Cortier, and E. Zalinescu. Deciding security properties for cryptographic protocols. Application to key cycles. ACM Transactions on Computational Logic (TOCL), 11(4):496-520, 2010.
-
(2010)
ACM Transactions on Computational Logic (TOCL)
, vol.11
, Issue.4
, pp. 496-520
-
-
Comon-Lundh, H.1
Cortier, V.2
Zalinescu, E.3
-
13
-
-
17444426121
-
Ariadne: A secure on- demand routing protocol for Ad Hoc networks
-
January
-
Y.-C. Hu, A. Perrig, and D. Johnson. Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks. Wireless Networks, 11, January 2005.
-
(2005)
Wireless Networks
, vol.11
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
14
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2):370-380, 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
0001341422
-
DSR: The dynamic source routing protocol for multi-hop wireless Ad hoc networks
-
D. Johnson, D. Maltz, and J. Broch. DSR: The Dynamic Source Routing Protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking, pages 139-172, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
16
-
-
0001341422
-
DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
-
edited by Charles E. Perkins, Chapter 5, Addison-Wesley
-
D. B. Johnson, D. A. Maltz, and J. Broch. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In In Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pages 139-172. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
17
-
-
24944466187
-
Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
-
Vol. 2
-
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. In Wireless Communications and Networking Conference, volume 2, pages 1193-1199 Vol. 2, 2005.
-
(2005)
Wireless Communications and Networking Conference
, vol.2
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
19
-
-
33750440529
-
A framework for security analysis of mobile wireless networks
-
S. Nanz and C. Hankin. A Framework for Security Analysis of Mobile Wireless Networks. Theoretical Computer Science, 367(1):203-227, 2006.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1
, pp. 203-227
-
-
Nanz, S.1
Hankin, C.2
-
21
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85- 128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
|