Security analysis of the Bootstrap protocol for deny-by-default Mobile Ad-hoc Networks
暂无分享,去创建一个
Xiaoyu Ni | Brian DeCleene | O. Patrick Kreidl | Jim Kurose | Honggang Zhang | O. P. Kreidl | J. Kurose | B. DeCleene | Honggang Zhang | Xiaoyu Ni
[1] John A. Clark,et al. Threat Modelling for Mobile Ad Hoc and Sensor Networks , 2009 .
[2] Thomas Hérault,et al. Probabilistic Model Checking of the CSMA/CD Protocol Using PRISM and APMC , 2005, AVoCS.
[3] Kang-Won Lee,et al. How to Enable Policy-Based Interactions in Dynamic Wireless Networks? , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.
[4] William A. Arbaugh,et al. Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[5] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.
[6] Vitaly Shmatikov,et al. Probabilistic Model Checking of an Anonymity System , 2004 .
[7] D. Towsley,et al. Bootstrapping deny-by-default access control for mobile ad-hoc networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[8] Vitaly Shmatikov. Probabilistic analysis of an anonymity system , 2004, J. Comput. Secur..
[9] Argyraki,et al. Network Capabilities : The Good , the Bad and the Ugly Katerina , 2022 .
[10] Mick Bauer. Paranoid penguin: Introduction to SELinux, Part II , 2007 .
[11] Gerard J. Holzmann,et al. The SPIN Model Checker - primer and reference manual , 2003 .
[12] Sergey Bratus,et al. Pastures: Towards Usable Security Policy Engineering , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[13] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[14] Gregor von Bochmann,et al. Formal Methods in Communication Protocol Design , 1980, IEEE Trans. Commun..
[15] Holger Peine,et al. Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[16] Marta Z. Kwiatkowska,et al. PRISM: Probabilistic Symbolic Model Checker , 2002, Computer Performance Evaluation / TOOLS.
[17] Sandeep N. Bhatt,et al. Federated security management for dynamic coalitions , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[18] Wesley M. Eddy,et al. TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.
[19] L. Kant,et al. Performance Analysis of Drama: A Distributed Policy-Based System for Manet Management , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[20] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[21] Tilman Wolf. Design of a network architecture with inherent data path security , 2007, ANCS '07.
[22] Angelos D. Keromytis,et al. The STRONGMAN architecture , 2003, Proceedings DARPA Information Survivability Conference and Exposition.