Deriving authentication for pervasive security
暂无分享,去创建一个
[1] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[2] Srdjan Capkun,et al. iPhone and iPod Location Spoofing , 2008 .
[3] Martín Abadi,et al. Authentication in distributed systems: theory and practice , 1991, SOSP '91.
[4] John C. Mitchell,et al. A derivation system for security protocols and its logical formalization , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[5] Dusko Pavlovic,et al. An encapsulated authentication logic for reasoning about key distribution protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[6] Markus G. Kuhn,et al. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.
[7] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[8] Sadie Creese,et al. The attacker in ubiquitous computing environments: formalising the threat model , 2003 .
[9] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[10] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[11] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[12] Hai Xu,et al. A Quantum Network Manager that Supports a One-Time Pad Stream , 2008, Second International Conference on Quantum, Nano and Micro Technologies (ICQNM 2008).
[13] Dusko Pavlovic,et al. Deriving secrecy properties in key establishment protocols , 2006 .
[14] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] Frank Stajano,et al. Multichannel Security Protocols , 2007, IEEE Pervasive Computing.
[16] Radha Poovendran,et al. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.