Verification with AVISPA to Engineer Network Security Protocols
暂无分享,去创建一个
[1] David N. Cottingham,et al. Is Latency the Real Enemy in Next Generation Networks ? , .
[2] Aboubaker Lasebae,et al. Exploring the concept of scope to provide better security for internet services. , 2011 .
[3] Yoney Kirsal Ever,et al. Development of security strategies using Kerberos in wireless networks , 2011 .
[4] Mahdi Aiash,et al. Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks , 2009, 2009 International Conference on Network-Based Information Systems.
[5] Florian Kammueller,et al. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. , 2012 .
[6] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[7] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[8] Jin-Young Choi,et al. Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[9] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[10] Jon Crowcroft,et al. Y-Comm: a global architecture for heterogeneous networking , 2007, WICON '07.