A formally verified access control mechanism for information centric networks
暂无分享,去创建一个
[1] Mahdi Aiash. A formal analysis of authentication protocols for mobile devices in next generation networks , 2015, Concurr. Comput. Pract. Exp..
[2] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[3] Jonathan Loo,et al. An integrated authentication and authorization approach for the network of information architecture , 2015, J. Netw. Comput. Appl..
[4] Stephen Farrell,et al. The Named Information (ni) URI Scheme: Optional Features , 2012 .
[5] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[6] Gavin Lowe. Analyzing a Library of Security Protocols using Casper and FDR , 1999 .
[7] Failures-divergence Refinement Fdr2 User Manual , 2012 .
[8] Bengt Ahlgren,et al. A survey of information-centric networking , 2012, IEEE Communications Magazine.
[9] Hsing-Chung Chen. A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment , 2014, J. Netw. Comput. Appl..
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Jonathan Loo,et al. Challenges and solutions for secure information centric networks: A case study of the NetInf architecture , 2015, J. Netw. Comput. Appl..
[12] Stephen Farrell,et al. The NetInf Protocol , 2013 .