Security protocols in wirelessman
暂无分享,去创建一个
[1] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[2] Rajashekar Kailar,et al. Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..
[3] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Tony Ballardie,et al. Scalable Multicast Key Distribution , 1996, RFC.
[5] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Catherine A. Meadows,et al. The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..
[7] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..
[8] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[9] Chin-Tser Huang,et al. Secure Multicast in WiMAX , 2008, J. Networks.
[10] Wenbo Mao,et al. An augmentation of BAN-like logics , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[11] John C. Mitchell,et al. Analysis of Security Protocols for Wireless Networks , 2005 .
[12] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[13] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[14] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[15] S. Brackin,et al. CAPSL interface for the NRL Protocol Analyzer , 1999, Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122).
[16] Catherine A. Meadows,et al. Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer , 2004, J. Comput. Secur..
[17] Chin-Tser Huang,et al. Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.
[18] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[19] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[20] Chin-Tser Huang,et al. Secure multicast in various scenarios of WirelessMAN , 2007, Proceedings 2007 IEEE SoutheastCon.
[21] Catherine A. Meadows,et al. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches , 1996, ESORICS.
[22] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[23] Dawn Xiaodong Song,et al. Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..
[24] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[25] Dieter Gollmann. On the Verification of Cryptographic Protocols - A Tale of Two Committees , 2000, Electron. Notes Theor. Comput. Sci..
[26] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[27] Stephen H. Brackin,et al. A HOL extension of GNY for automatically analyzing cryptographic protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[28] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[29] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[30] Jonathan K. Millen,et al. Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.
[31] Sandeep S. Kulkarni,et al. Adaptive Rekeying for Secure Multicast , 2003 .
[32] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[33] Ashok Samal,et al. Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..
[34] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .
[35] S. Wang,et al. IEEE standard 802.16: a technical overview of the WirelessMAN/sup TM/ air interface for broadband wireless access , 2002, IEEE Communications Magazine.
[36] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[37] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[38] Richard A. Kemmerer. Using Formal Verification Techniques to Analyze Encryption Protocols , 1987, 1987 IEEE Symposium on Security and Privacy.
[39] Gavin Lowe. A Family of Attacks upon Authentication Protocols , 1997 .
[40] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[41] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[42] Ender Yuksel,et al. Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .
[43] Chong-kwon Kim,et al. A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access , 2005, International Conference on Computational Science.
[44] A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[45] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[46] Gavin Lowe,et al. Analysing a Stream Authentication Protocol Using Model Checking , 2002, ESORICS.
[47] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[48] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[49] Dieter Gollmann. What do we mean by entity authentication? , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[50] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[51] Paul C. van Oorschot,et al. Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.