A framework for security analysis of mobile wireless networks
暂无分享,去创建一个
[1] Chris Hankin,et al. Static Analysis of Routing Protocols for Ad-Hoc Networks , 2004 .
[2] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[3] Emilio Tuosto,et al. The Klaim Project: Theory and Practice , 2003, Global Computing.
[4] Olin Shivers,et al. Control flow analysis in scheme , 1988, PLDI '88.
[5] K. V. S. Prasad. A Calculus of Broadcasting Systems , 1991, Sci. Comput. Program..
[6] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[7] Chris Hankin,et al. Formal Security Analysis for Ad-Hoc Networks , 2006, Electron. Notes Theor. Comput. Sci..
[8] Marta Z. Kwiatkowska,et al. A Timing Analysis of AODV , 2005, FMOODS.
[9] Flemming Nielson,et al. Flow Logic: A Multi-paradigmatic Approach to Static Analysis , 2002, The Essence of Computation.
[10] Flemming Nielson,et al. The Succinct Solver Suite , 2004, TACAS.
[11] Traian Muntean,et al. A broadcast-based calculus for communicating systems , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[12] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[13] Flemming Nielson,et al. Static validation of security protocols , 2005, J. Comput. Secur..
[14] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[15] A GunterCarl,et al. Formal verification of standards for distance vector routing protocols , 2002 .
[16] Flemming Nielson,et al. Control Flow Analysis for the pi-calculus , 1998, CONCUR.
[17] Michael Goldsmith,et al. A Methodology for Model-Checking Ad-hoc Networks , 2003, SPIN.
[18] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[19] Sebastian Nanz,et al. Specification and security analysis of mobile ad-hoc networks , 2006 .
[20] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[21] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[22] Luca Cardelli,et al. Mobile Ambients , 1998, FoSSaCS.
[23] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[24] Peter Y. A. Ryan,et al. The modelling and analysis of security protocols: the csp approach , 2000 .
[25] Flemming Nielson,et al. Automatic validation of protocol narration , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[26] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[27] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[28] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[29] Carl A. Gunter,et al. Formal verification of standards for distance vector routing protocols , 2002, JACM.
[30] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[31] Arnold Pears,et al. Automatized Verification of Ad Hoc Routing Protocols , 2004, FORTE.
[32] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[33] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[34] Flemming Nielson,et al. A calculus for control flow analysis of security protocols , 2004, International Journal of Information Security.
[35] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[36] Flemming Nielson,et al. Spatial Analysis of BioAmbients , 2004, SAS.