-
1
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
K. Etessami & S. K. Rajamani (Eds.). CAV. Berlin: Springer
-
Armando, A., Basin, D. A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Héam, P. C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch,M., Santiago, J., Turuani, M., Viganò, L., & Vigneron, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami & S. K. Rajamani (Eds.), Lecture notes in computer science: Vol. 3576. CAV (pp. 281-285). Berlin: Springer.
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.A.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuéllar, J.6
Drielsma, P.H.7
Héam, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
2
-
-
33745824225
-
Symbolic and cryptographic analysis of the secure WSReliableMessaging scenario
-
L. Aceto&A. Ingólfsdóttir (Eds.). FoSSaCS. Berlin: Springer
-
Backes, M., Mödersheim, S., Pfitzmann, B., & Viganò, L. (2006). Symbolic and cryptographic analysis of the secure WSReliableMessaging scenario. In L. Aceto&A. Ingólfsdóttir (Eds.), Lecture notes in computer science: Vol. 3921. FoSSaCS (pp. 428- 445). Berlin: Springer.
-
(2006)
Lecture Notes in Computer Science
, vol.3921
, pp. 428-445
-
-
Backes, M.1
Mödersheim, S.2
Pfitzmann, B.3
Viganò, L.4
-
3
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
New York: IEEE
-
Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997). A concrete security treatment of symmetric encryption. In Proceedings of 38th annual symposium on foundations of computer science (pp. 394-403). New York: IEEE.
-
(1997)
Proceedings of 38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J., & Rogaway, P. (2000). The security of the cipher block chaining message authentication code. Journal of Computer and Systems Sciences, 61(3), 362-399.
-
(2000)
Journal of Computer and Systems Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
14844303360
-
Verifying policy-based security for web services
-
V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.),. New York: Assoc. Comput. Mach
-
Bhargavan, K., Fournet, C., & Gordon, A. D. (2004). Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.), ACM conference on computer and communications security (pp. 268-277). New York: Assoc. Comput. Mach.
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 268-277
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Los Alamitos: IEEE Comput. Soc
-
Chan, H., Perrig, A., & Song, D. X. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy (p. 197). Los Alamitos: IEEE Comput. Soc.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
7
-
-
23144433992
-
A high level protocol specification language for industrial security-sensitive protocols
-
Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Mantovani, J., Mödersheim, S., & Vigneron, L. (2004) A high level protocol specification language for industrial security-sensitive protocols. In Proceedings of workshop on specification and automated processing of security requirements (SAPS) (pp. 193-205).
-
(2004)
Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS)
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuéllar, J.3
Drielsma, P.H.4
Mantovani, J.5
Mödersheim, S.6
Vigneron, L.7
-
9
-
-
0019649307
-
On the security of public key protocols
-
New York: IEEE
-
Dolev, D., & Yao, A. C. C. (1981). On the security of public key protocols. In FOCS (pp. 350-357). New York: IEEE.
-
(1981)
FOCS
, pp. 350-357
-
-
Dolev, D.1
Yao, A.C.C.2
-
10
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
V. Atluri (Ed.),. New York: Assoc. Comput. Mach
-
Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In V. Atluri (Ed.), ACM conference on computer and communications security (pp. 41-47). New York: Assoc. Comput. Mach.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
11
-
-
37049030912
-
A security protocol animator tool for AVISPA
-
Pisa
-
Glouche, Y., Genet, T., Heen, O., & Courtay, O. (2006). A security protocol animator tool for AVISPA. In ARTIST2 workshop on security specification and verification of embedded systems, Pisa.
-
(2006)
ARTIST2 Workshop on Security Specification and Verification of Embedded Systems
-
-
Glouche, Y.1
Genet, T.2
Heen, O.3
Courtay, O.4
-
12
-
-
0037268614
-
How to prevent type flaw attacks on security protocols
-
Heather, J., Lowe, G.,&Schneider, S. (2003). How to prevent type flaw attacks on security protocols. Journal of Computer Security, 11(2), 217-244.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 217-244
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
13
-
-
0034445661
-
System architecture directions for networked sensors
-
ASPLOS
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. E., & Pister, K. S. J. (2000). System architecture directions for networked sensors. In Inter. conf. on architectural support for programming languages and operating systems, ASPLOS (pp. 93-104).
-
(2000)
Inter. Conf. on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
14
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA, November 3-5, 2004. New York: Assoc. Comput. Mach
-
Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys 2004 (pp. 162-175). Baltimore, MD, USA, November 3-5, 2004. New York: Assoc. Comput. Mach.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
15
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G. (1998). Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1-2), 53-84.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
16
-
-
33745787568
-
Finite-state analysis of security protocols
-
A. J. Hu & M. Y. Vardi (Eds.). CAV. Berlin: Springer
-
Mitchell, J. C. (1998). Finite-state analysis of security protocols. In A. J. Hu & M. Y. Vardi (Eds.), Lecture notes in computer science: Vol. 1427. CAV (pp. 71-76). Berlin: Springer.
-
(1998)
Lecture Notes in Computer Science
, vol.1427
, pp. 71-76
-
-
Mitchell, J.C.1
-
17
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J. A.,&Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.A.2
Wagner, D.3
-
18
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
19
-
-
33646140557
-
Application of formal methods to the analysis of web services security
-
M. Bravetti, L. Kloul, & G. Zavattaro (Eds.). EPEW/WS-FM. Berlin: Springer
-
Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2005). Application of formal methods to the analysis of web services security. In M. Bravetti, L. Kloul, & G. Zavattaro (Eds.), Lecture notes in computer science: Vol. 3670. EPEW/WS-FM (pp. 215- 229). Berlin: Springer.
-
(2005)
Lecture Notes in Computer Science
, vol.3670
, pp. 215-229
-
-
Tobarra, M.L.1
Cazorla, D.2
Cuartero, F.3
Diaz, G.4
-
20
-
-
37049022035
-
Formal verification of TLS handshake and extensions for wireless networks
-
San Sebastian: IADIS
-
Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2006). Formal verification of TLS handshake and extensions for wireless networks. In Proc. of IADIS international conference on applied computing (AC'06) (pp. 57-64). San Sebastian: IADIS.
-
(2006)
Proc. of IADIS International Conference on Applied Computing (AC'06)
, pp. 57-64
-
-
Tobarra, M.L.1
Cazorla, D.2
Cuartero, F.3
Diaz, G.4
-
21
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
New York: Assoc. Comput. Mach. doi:10.1145/1029102.1029113
-
Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004). Tinypk: securing sensor networks with public key technology. In SASN'04: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59-64). New York: Assoc. Comput. Mach. doi:10.1145/1029102. 1029113, http://portal.acm.org/citation.cfm?id=1029113.
-
(2004)
SASN'04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
22
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Jajodia, V. Atluri, & T. Jaeger (Eds.),. New York: Assoc. Comput. Mach
-
Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In S. Jajodia, V. Atluri, & T. Jaeger (Eds.), ACM conference on computer and communications security (pp. 62-72). New York: Assoc. Comput. Mach.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|