Security analysis of Robust User Authentication Protocol
暂无分享,去创建一个
[1] C. Pearce,et al. A secure communication protocol for ad-hoc wireless sensor networks , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..
[2] Kamil Saraç,et al. A security framework for service overlay networks: Access control , 2008, 2008 5th International Conference on Broadband Communications, Networks and Systems.
[3] Luiz A. DaSilva,et al. Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.
[4] Riccardo Sisto,et al. Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study , 2001, Mobile Agents.
[5] Jin-Young Choi,et al. FDR verification of ESANP protocol in Ad hoc Network , 2004, SNPD.
[6] Davor Obradovic,et al. Formal Analysis of Convergence of Routing Protocols , 2000 .
[7] Rahmat Budiarto,et al. Unreliable Network Re-Authentication Protocol Based on Hybrid Key Using CSP Approach , 2007 .
[8] Sumeet Singh,et al. SecureWS - A Secure, Application Layer Communication Channel for Web Services , 2006 .
[9] Todd R. Andel,et al. Formal security evaluation of ad hoc routing protocols , 2007 .
[10] Debmalya Biswas,et al. Application of Model Checking to AXML System's Security: A Case Study , 2006, WS-FM.
[11] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[12] Sudip Misra,et al. Guide to Wireless Ad Hoc Networks , 2009, Computer Communications and Networks.
[13] Huaxiong Wang,et al. Formal Security Analysis of Australian E-passport Implementation , 2008, AISC.
[14] Huaxiong Wang,et al. Formal analysis of card-based payment systems in mobile devices , 2006, ACSW.
[15] John Marshall,et al. An Analysis Of The Secure Routing Protocol For Mobile Ad Hoc Network Route Discovery: Using Intuitiv , 2003 .
[16] Ed Dawson,et al. Classification of Authentication Protocols: A Practical Approach , 2000, ISW.