Authentication for Mobile IPv6
暂无分享,去创建一个
[1] Victor Fajardo,et al. Diameter Base Protocol , 2003, RFC.
[2] Dominique Bolignano,et al. Towards a Mechanization of Cryptographic Protocal Verification , 1997, CAV.
[3] Vitaly Shmatikov,et al. Analysis of a Fair Exchange Protocol , 2000, NDSS.
[4] David L. Dill,et al. Automatic verification of the SCI cache coherence protocol , 1995, CHARME.
[5] James M. Galvin. Public Key Distribution with Secure DNS , 1996, USENIX Security Symposium.
[6] Jonathan K. Millen,et al. Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Philip R. Karn,et al. Photuris: Extended Schemes and Attributes , 1999, RFC.
[9] Stefan Mangard,et al. A new approach to DNS security (DNSSEC) , 2001, CCS '01.
[10] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[11] Pekka Nikander,et al. Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6 , 2001 .
[12] Vitaly Shmatikov,et al. Efficient finite-state analysis for large security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[13] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[14] Vitaly Shmatikov,et al. Finite-State Analysis of SSL 3.0 , 1998, USENIX Security Symposium.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[17] A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[18] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[19] S. Bradner,et al. A Framework for Purpose Built Keys (PBK) , 2003 .
[20] Catherine A. Meadows,et al. The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..
[21] David L. Dill,et al. Formal specification of abstract memory models , 1993 .