Authentication for Mobile IPv6

[1]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[2]  Dominique Bolignano,et al.  Towards a Mechanization of Cryptographic Protocal Verification , 1997, CAV.

[3]  Vitaly Shmatikov,et al.  Analysis of a Fair Exchange Protocol , 2000, NDSS.

[4]  David L. Dill,et al.  Automatic verification of the SCI cache coherence protocol , 1995, CHARME.

[5]  James M. Galvin Public Key Distribution with Secure DNS , 1996, USENIX Security Symposium.

[6]  Jonathan K. Millen,et al.  Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Philip R. Karn,et al.  Photuris: Extended Schemes and Attributes , 1999, RFC.

[9]  Stefan Mangard,et al.  A new approach to DNS security (DNSSEC) , 2001, CCS '01.

[10]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[11]  Pekka Nikander,et al.  Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6 , 2001 .

[12]  Vitaly Shmatikov,et al.  Efficient finite-state analysis for large security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[13]  John C. Mitchell,et al.  Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[14]  Vitaly Shmatikov,et al.  Finite-State Analysis of SSL 3.0 , 1998, USENIX Security Symposium.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Lawrence C. Paulson,et al.  The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..

[17]  A. W. Roscoe Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[18]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[19]  S. Bradner,et al.  A Framework for Purpose Built Keys (PBK) , 2003 .

[20]  Catherine A. Meadows,et al.  The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..

[21]  David L. Dill,et al.  Formal specification of abstract memory models , 1993 .