-
1
-
-
0000523051
-
A Logic of Authentication
-
December
-
M. Abadi, M. Burrows, R. Needham. "A Logic of Authentication", Proceeding of the Royal Society, Series A, pp. 233-271, December 1989.
-
(1989)
Proceeding of the Royal Society, Series A
, pp. 233-271
-
-
Abadi, M.1
Burrows, M.2
Needham, R.3
-
2
-
-
3042686296
-
Formal verification of PAP and EAP-MD5 Protocols in wireless networks: FDR Model Checking
-
I.G. Kim and J.Y. Choi, "Formal verification of PAP and EAP-MD5 Protocols in wireless networks: FDR Model Checking", AINA, 2004.
-
(2004)
AINA
-
-
Kim, I.G.1
Choi, J.Y.2
-
3
-
-
33744479613
-
Modeling and analysis of security protocols: The CSP Approach
-
P.Y.A. Ryan and S.A. Schneider, "Modeling and analysis of security protocols: the CSP Approach", Addison- Wesley, 2001.
-
(2001)
Addison- Wesley
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
4
-
-
0018005391
-
Communicating sequential processes
-
C.A.R. Hoare, "Communicating sequential processes", Communications of ACM, vol. 21, no. 8, pp.666-677, 1978.
-
(1978)
Communications of ACM
, vol.21
, Issue.8
, pp. 666-677
-
-
Hoare, C.A.R.1
-
7
-
-
33744479613
-
Modeling and analysis of security protocols: The CSP Approach
-
P.Y.A. Ryan and S.A. Schneider, "Modeling and analysis of security protocols: the CSP Approach", Addison- Wesley, 2001.
-
(2001)
Addison- Wesley
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
11
-
-
84925368904
-
802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions", USENIX Security Symposium, 2003.
-
(2003)
USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
13
-
-
84878654660
-
-
PKM Protocols using CasperFDR, IEEE ISWCS
-
S. Xu, M.M. Matthews, and C.T. Huang, "Modeling and Analysis of IEEE 802.16 PKM Protocols using CasperFDR", IEEE ISWCS, 2008.
-
(2008)
Modeling and Analysis of IEEE 802
, vol.16
-
-
Xu, S.1
Matthews, M.M.2
Huang, C.T.3
-
14
-
-
84878632151
-
Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR, ICT
-
K. V. Krishnam Raju, V. Valli kumari, N. Sandeep varma, KVSVN. Raju, "Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR", ICT, Springer LNCS-CCSIS, 2010.
-
(2010)
Springer LNCS-CCSIS
-
-
Raju, K.V.K.1
Kumari, V.V.2
Varma, N.S.3
Raju, K.V.S.V.N.4
-
15
-
-
33744903731
-
-
WMCS, IEEE Xplore
-
Il-Gon Kim, Hyun-Seok Kim, Ji-Yeon Lee and Jin-Young choi, "Analysis and Modification of ASK Mobile Security Protocol", WMCS, IEEE Xplore, 2005.
-
(2005)
Analysis and Modification of ASK Mobile Security Protocol
-
-
Kim, I.-G.1
Kim, H.-S.2
Lee, J.-Y.3
Choi, J.-Y.4
-
16
-
-
70350692816
-
Modeling and Formal Verification of DHCP Using SPIN
-
June
-
Syed Islam, Mohammed H.Sqvalli and Sohel Khan, "Modeling and Formal Verification of DHCP Using SPIN", International journal of computer science& applications, vol. 3, no. 6, June 2006.
-
(2006)
International Journal of Computer Science& Applications, Vol
, vol.6
, pp. 3
-
-
Islam, S.1
Sqvalli, M.H.2
Khan, S.3
-
17
-
-
84878636454
-
-
Accessed on 14-03-2010
-
http://www.lylebackemort.com/blog/2008/5/10/wpa-wpa2-as-insecure-as-i-expected,Accessed on 14-03-2010.
-
-
-
-
18
-
-
84878654660
-
-
PKM Protocol using CasperFDR, IEEE ICWCS
-
Sen Xu, Chin-Tser Huang, Manton M. Matthews, "Modeling and Analysis of IEEE 802.16 PKM Protocol using CasperFDR", IEEE ICWCS, 2008.
-
(2008)
Modeling and Analysis of IEEE 802
, vol.16
-
-
Sen, X.1
Huang, C.-T.2
Manton, M.3
-
19
-
-
84878656080
-
-
ICNCS, IEEE Xplore
-
K. V. Krishnam Raju, V. Valli kumari, KVSVN. Raju, "Modeling and Analysis of IEEE802.11i WPA-PSK title; Authentication Protocol", ICNCS, IEEE Xplore, 2011.
-
(2011)
Modeling and Analysis of IEEE802.11i WPA-PSK book
-
-
Raju, K.V.K.1
Kumari, V.V.2
Raju, K.V.S.V.N.3
-
20
-
-
84878625406
-
-
WPA-GPG Authentication Protocol, AIM, Springer LNCS-CCIS
-
K. V. Krishnam Raju, V. Valli kumari, "Formal Verification of IEEE802.11i WPA-GPG Authentication Protocol", AIM, Springer LNCS-CCIS, 2011
-
(2011)
Formal Verification of IEEE802
, vol.11
-
-
Raju, K.V.K.1
Kumari, V.V.2
|