메뉴 건너뛰기




Volumn 8, Issue 4, 2013, Pages 769-778

Formal verification of IEEE 802.11 authentication protocols

Author keywords

802.11w; CasperFDR; CSP; Formal Verification; IEEE 802.11i, WPA PSK, WPA GPG, IEEE

Indexed keywords

802.11W; CASPERFDR; CSP; FORMAL VERIFICATIONS; IEEE802.11I;

EID: 84878630477     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.8.4.769-778     Document Type: Article
Times cited : (4)

References (20)
  • 2
    • 3042686296 scopus 로고    scopus 로고
    • Formal verification of PAP and EAP-MD5 Protocols in wireless networks: FDR Model Checking
    • I.G. Kim and J.Y. Choi, "Formal verification of PAP and EAP-MD5 Protocols in wireless networks: FDR Model Checking", AINA, 2004.
    • (2004) AINA
    • Kim, I.G.1    Choi, J.Y.2
  • 3
    • 33744479613 scopus 로고    scopus 로고
    • Modeling and analysis of security protocols: The CSP Approach
    • P.Y.A. Ryan and S.A. Schneider, "Modeling and analysis of security protocols: the CSP Approach", Addison- Wesley, 2001.
    • (2001) Addison- Wesley
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 4
    • 0018005391 scopus 로고
    • Communicating sequential processes
    • C.A.R. Hoare, "Communicating sequential processes", Communications of ACM, vol. 21, no. 8, pp.666-677, 1978.
    • (1978) Communications of ACM , vol.21 , Issue.8 , pp. 666-677
    • Hoare, C.A.R.1
  • 7
    • 33744479613 scopus 로고    scopus 로고
    • Modeling and analysis of security protocols: The CSP Approach
    • P.Y.A. Ryan and S.A. Schneider, "Modeling and analysis of security protocols: the CSP Approach", Addison- Wesley, 2001.
    • (2001) Addison- Wesley
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 11
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions", USENIX Security Symposium, 2003.
    • (2003) USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 17
    • 84878636454 scopus 로고    scopus 로고
    • Accessed on 14-03-2010
    • http://www.lylebackemort.com/blog/2008/5/10/wpa-wpa2-as-insecure-as-i-expected,Accessed on 14-03-2010.
  • 20
    • 84878625406 scopus 로고    scopus 로고
    • WPA-GPG Authentication Protocol, AIM, Springer LNCS-CCIS
    • K. V. Krishnam Raju, V. Valli kumari, "Formal Verification of IEEE802.11i WPA-GPG Authentication Protocol", AIM, Springer LNCS-CCIS, 2011
    • (2011) Formal Verification of IEEE802 , vol.11
    • Raju, K.V.K.1    Kumari, V.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.