Formalization and Verification of the PKMv3 Protocol Using CSP
暂无分享,去创建一个
Jian Guo | Gang Lu | Huibiao Zhu | Xiaoran Zhu | Yuanmin Xu | Xi Wu
[1] Fan Yang. Comparative Analysis on TEK Exchange between PKMv1 and PKMV2 for WiMAX , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[2] Luu Anh Tuan,et al. Modeling and Verifying Security Protocols Using PAT Approach , 2010, SSIRI 2010.
[3] A. W. Roscoe. Understanding Concurrent Systems , 2010, Texts in Computer Science.
[4] Chin-Tser Huang,et al. Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.
[5] Valli Kumari Vatsavayi,et al. Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR , 2010, ICT.
[6] Toshiaki Tanaka,et al. Security Vulnerabilities and Solutions in Mobile WiMAX , 2007 .
[7] Ning Zhang,et al. Analysis of mobile WiMAX security: Vulnerabilities and solutions , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.