A Quantitative Study of Two Attacks
暂无分享,去创建一个
[1] Corrado Priami. Language-based Performance Prediction for Distributed and Mobile Systems , 2002, Inf. Comput..
[2] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[3] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[4] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..
[5] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[6] Corrado Priami,et al. Enhanced operational semantics , 1996, CSUR.
[7] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[8] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[9] Corrado Priami,et al. Performance Evaluation of Mobile Processes via Abstract Machines , 2001, IEEE Trans. Software Eng..
[10] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[11] Flemming Nielson,et al. A calculus for control flow analysis of security protocols , 2004, International Journal of Information Security.
[12] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[13] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[14] PEPAGraham Clark. Formalising the Specification of Rewardswith , 1996 .
[15] Dawn Xiaodong Song,et al. A First Step Towards the Automatic Generation of Security Protocols , 2000, NDSS.
[16] Iliano Cervesato. Fine-Grained MSR Specifications for Quantitative Security Analysis , 2004 .
[17] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[18] Flemming Nielson,et al. Automatic validation of protocol narration , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[19] Corrado Priami,et al. Enhanced operational semantics: a tool for describing and analyzing concurrent systems , 2001, CSUR.
[20] Jane Hillston,et al. A compositional approach to performance modelling , 1996 .
[21] Flemming Nielson,et al. Performance Evaluation of Security Protocols Specified in LySa , 2004, QAPL.
[22] Corrado Priami,et al. Non-Interleaving Semantics for Mobile Processes , 1999, Theor. Comput. Sci..
[23] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[24] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[25] Holger Hermanns,et al. Stochastic Process Algebras - Between LOTOS and Markov Chains , 1998, Comput. Networks.