Security analysis of routing protocol for MANET based on extended Rubin logic
暂无分享,去创建一个
Yang Xu | Xiaoyao Xie | Yang Xu | Xiaoyao Xie
[1] Paul C. van Oorschot,et al. Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.
[2] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[3] Peter Honeyman,et al. Nonmonotonic cryptographic protocols , 1994, Proceedings The Computer Security Foundations Workshop VII.
[4] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Wang Cai. A New Approach for the Analysis of Electronic Commerce Protocols , 2004 .
[7] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[8] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[9] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[10] Aviel D. Rubin. Extending NCP for protocols using public keys , 1997, Mob. Networks Appl..
[11] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[12] J P Robinson,et al. Protest rock and drugs. , 1976, The Journal of communication.
[13] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[14] Rajashekar Kailar. Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..
[15] Zhou Dian. Limitations of Kailar Logic , 1999 .
[16] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[17] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[19] Li Xing. BAN-like logic for cryptographic protocols analysis: a survey , 2002 .
[20] Seung Yi,et al. A Security-Aware Routing Protocol for Wireless Ad Hoc Networks , 2002 .
[21] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Wang Mei-qin. Security analysis of routing protocol for MANET based on BAN logic , 2005 .