Verification of Privacy Preserving Authentication Protocol for VANETs
暂无分享,去创建一个
[1] Brijesh Kumar Chaurasia,et al. Infrastructure Aided Privacy Preserving-Authentication in VANETs , 2010, ISA.
[2] Gerard J. Holzmann,et al. The Model Checker SPIN , 1997, IEEE Trans. Software Eng..
[3] Stephan Merz,et al. Model Checking , 2000 .
[4] Mordechai Ben-Ari,et al. Principles of concurrent and distributed programming , 2005, PHI Series in computer science.
[5] Martin Peschke,et al. Design and Validation of Computer Protocols , 2003 .
[6] Benjamin Cox,et al. NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.
[7] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[8] Brijesh Kumar Chaurasia,et al. Infrastructure Aided Privacy Preserving-Authentication in VANETs , 2010, FGIT.
[9] Madhavan Mukund,et al. Generic Verification of Security Protocols , 2005, SPIN.
[10] Chuck Yoo,et al. Comments on 'The Model Checker SPIN' , 2001, IEEE Trans. Software Eng..
[11] Shekhar Verma,et al. Prediction of Lane Change Trajectories through Neural Network , 2010, 2010 International Conference on Computational Intelligence and Communication Networks.
[12] Jörg Brauer,et al. Model checking embedded software of an industrial knitting machine , 2011, Int. J. Inf. Technol. Commun. Convergence.
[13] Hartmut König,et al. Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker , 2008, 2008 International Conference on Computer Science and Software Engineering.
[14] Insup Lee,et al. A Complete Axiomatization of Finite-State ACSR Processes , 1997, Inf. Comput..
[15] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[16] James E. Rumbaugh,et al. Object-Oriented Modelling and Design , 1991 .
[17] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[18] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[19] Gerard J. Holzmann,et al. The SPIN Model Checker - primer and reference manual , 2003 .
[20] Nhut Nguyen,et al. Authentication and Privacy , 2008 .
[21] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[22] Siu-Ming Yiu,et al. SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.
[23] Yixian Yang,et al. Information system security function validating using model checking , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[24] Sudhan Majhi,et al. The Design of a Wireless Access for Vehicular Environment (WAVE) Prototype for Intelligent Transportation System (ITS) and Vehicular Infrastructure Integration (VII) , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[25] Qin Li,et al. Formal Modeling and Analyzing Kerberos Protocol , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.
[26] Mordechai Ben-Ari,et al. Principles of the spin model checker , 2008 .