-
1
-
-
35048865382
-
Computationally Sound Mechanized Proofs of Correspondence Assertions
-
Venice, Italy
-
Blanchet, B.: Computationally Sound Mechanized Proofs of Correspondence Assertions. In: 20th IEEE Computer Security Foundations Symposium (CSF 2007), Venice, Italy, pp. 97-111 (2007)
-
(2007)
20th IEEE Computer Security Foundations Symposium (CSF 2007)
, pp. 97-111
-
-
Blanchet, B.1
-
2
-
-
68249091950
-
Automatic Verification of Correspondences for Security Protocols
-
Blanchet, B.: Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security 17(4), 363-434 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
3
-
-
17744379731
-
A Calculus for Control Flow Analysis of Security Protocols
-
Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security 2(3-4), 145-167 (2004)
-
(2004)
International Journal of Information Security
, vol.2
, Issue.3-4
, pp. 145-167
-
-
Buchholtz, M.1
Nielson, H.R.2
Nielson, F.3
-
5
-
-
77956596618
-
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
-
In: Dawar, A., Veith, H. (eds.), LNCS, Springer, Heidelberg
-
Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol. 6247, pp. 1-18. Springer, Heidelberg (2010)
-
(2010)
CSL 2010
, vol.6247
, pp. 1-18
-
-
Basin, D.1
Cremers, C.2
-
6
-
-
81855183282
-
Formal Reasoning about Physical Properties of Security Protocols
-
Basin, D.A., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning about Physical Properties of Security Protocols. ACM Trans. Inf. Syst. Secur. 14(2), 16 (2011)
-
(2011)
ACM Trans. Inf. Syst Secur
, vol.14
, Issue.2
, pp. 16
-
-
Basin, D.A.1
Capkun, S.2
Schaller, P.3
Schmidt, B.4
-
7
-
-
76549106506
-
Vulnerabilities and attacks in wireless sensor networks
-
Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, 22-43 (2008)
-
(2008)
Wireless Sensors Networks Security
, pp. 22-43
-
-
Benenson, Z.1
Cholewinski, P.2
Freiling, F.3
-
8
-
-
84868094992
-
-
University of Mannheim, Technical Report
-
Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. University of Mannheim, Technical Report (2009)
-
(2009)
Presence, Intervention, Insertion: Unifying Attack and Failure Models In Wireless Sensor Networks
-
-
Benenson, Z.1
Dewald, A.2
Freiling, F.3
-
9
-
-
84963650728
-
Universal classes of hash functions (extended abstract)
-
ACM, New York
-
Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC 1977, pp. 106-112. ACM, New York (1977)
-
(1977)
Proceedings of the Ninth Annual ACM Symposium On Theory of Computing, STOC 1977
, pp. 106-112
-
-
Carter, J.L.1
Wegman, M.N.2
-
10
-
-
78449273182
-
Accurate Modelling and Prediction of Energy Availability In Energy Harvesting Real-time Embedded Systems
-
Lu, J., Liu, S., Wu, Q., Qiu, Q.: Accurate modelling and prediction of energy availability in energy harvesting real-time embedded systems. In: 2010 International Green Computing Conference, pp. 469-476 (2010)
-
(2010)
2010 International Green Computing Conference
, pp. 469-476
-
-
Lu, J.1
Liu, S.2
Wu, Q.3
Qiu, Q.4
-
11
-
-
78149394262
-
Main types of attacks in wireless sensor networks
-
9th WSEAS International Conference on Multimedia, Internet & Video Technologies, SSIP 2009/MIV 2009, Stevens Point, Wisconsin, USA, World Scientific and Engineering Academy and Society (WSEAS)
-
Lupu, T.-G.: Main types of attacks in wireless sensor networks. In: Proceedings of the 9th WSEAS International Conference on Signal, Speech and Image Processing, and 9th WSEAS International Conference on Multimedia, Internet & Video Technologies, SSIP 2009/MIV 2009, Stevens Point, Wisconsin, USA, pp. 180-185. World Scientific and Engineering Academy and Society (WSEAS) (2009)
-
(2009)
Proceedings of the 9th WSEAS International Conference On Signal, Speech and Image Processing
, pp. 180-185
-
-
Lupu, T.-G.1
-
13
-
-
79957896372
-
Providing Security In Energy Harvesting Sensor Networks
-
IEEE
-
Pelissier, S., Prabhakar, T., Jamadagni, H., Venkatesha Prasad, R., Niemegeers, I.: Providing security in energy harvesting sensor networks. In: Consumer Communications and Networking Conference (CCNC), pp. 452-456. IEEE (2011)
-
(2011)
Consumer Communications and Networking Conference (CCNC)
, pp. 452-456
-
-
Pelissier, S.1
Prabhakar, T.2
Jamadagni, H.3
Venkatesha Prasad, R.4
Niemegeers, I.5
-
16
-
-
78651454154
-
Qos and security in energy-harvesting wireless sensor networks
-
Taddeo, A.V., Mura, M., Ferrante, A.: Qos and security in energy-harvesting wireless sensor networks. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1-10 (2010)
-
(2010)
Proceedings of the 2010 International Conference On Security and Cryptography (SECRYPT)
, pp. 1-10
-
-
Taddeo, A.V.1
Mura, M.2
Ferrante, A.3
-
17
-
-
33646581008
-
Energy Analysis of Public-key Cryptography For Wireless Sensor Networks
-
Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), pp. 324-328 (2005)
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005)
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
18
-
-
84880476481
-
-
(ed.), LNCS, Springer, Heidelberg
-
Won, D. (ed.): ICISC 2000. LNCS, vol. 2015. Springer, Heidelberg (2001)
-
(2001)
ICISC 2000
, vol.2015
-
-
Won, D.1
|