Network Security and Metrology: A Survey
暂无分享,去创建一个
[1] Thomas Newe,et al. Formal verification logic for hybrid security protocols , 2003, Comput. Syst. Sci. Eng..
[2] Deepinder P. Sidhu. Authentication Protocols for Computer Networks: I , 1986, Comput. Networks.
[3] José G. Delgado-Frias,et al. FPGA schemes for minimizing the power-throughput trade-off in executing the Advanced Encryption Standard algorithm , 2010, J. Syst. Archit..
[4] Reham Abdellatif Abouhogail. New multicast authentication protocol for entrusted members using advanced encryption standard , 2011 .
[5] Simon S. Lamt. A Semantic Model for Authentication , 1993 .
[6] M. T. Mohammed,et al. Confidentiality enhancement of Secure Real Time Transport Protocol , 2012, 2012 8th International Computer Engineering Conference (ICENCO).
[7] William Stallings,et al. Cryptography and network security , 1998 .
[8] Bruno Blanchet,et al. Automatic verification of correspondences for security protocols , 2008, J. Comput. Secur..
[9] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[10] Tian-Fu Lee,et al. Enhancing the security of password authenticated key agreement protocols based on chaotic maps , 2015, Inf. Sci..
[11] Peter H. Sydenham,et al. Handbook of Measuring System Design , 2005 .
[12] Christoph Ruland,et al. Secure transfer of measurement data in open systems , 2006, Comput. Stand. Interfaces.
[13] Véronique Cortier. Verification of Security Protocols , 2009, VMCAI.
[14] Reham Abdellatif Abouhogail,et al. Security Assessment for Key Management in Mobile Ad Hoc Networks , 2014 .
[15] Reijo Savola,et al. Quality of security metrics and measurements , 2013, Comput. Secur..
[16] Vijay Varadharajan. Use of a formal description technique in the specification of authentication protocols , 1990 .
[17] Harmandeep Singh,et al. Effect of Black Hole Attack on AODV, OLSR and ZRP Protocol in MANETs , 2013 .
[18] Peter Honeyman,et al. Formal Methods for the Analysis of Authentication Protocols , 1993 .
[19] M. M. Menon,et al. Remote metrology, mapping, and motion sensing of plasma facing components using FM coherent laser radar , 2001 .
[20] Reham Abdellatif Abouhogail. Fast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks , 2014 .
[21] Anmin Fu,et al. An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network , 2012, Comput. Secur..
[22] Marc F. Desrosiers,et al. e-Calibrations: Using the Internet to Deliver Calibration Services in Real Time at Lower Cost , 2002 .
[23] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[24] Diomidis Spinellis,et al. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification , 1999, Comput. Commun..
[25] Mohammed S. Gadelrab,et al. Construction and remote calibration of an automated resistance measuring system , 2011 .
[26] S. A. M. Makki,et al. Accusation Resolution Using Security Metrology , 2006, WASA.
[27] José Meseguer,et al. A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties , 2006, Theor. Comput. Sci..
[28] Reham Abdellatif Abouhogail,et al. Performance Evaluation of Blackhole Attack on VANET's Routing Protocols , 2014 .
[29] Siddarama R. Patil,et al. A NOVEL APPROACH OF SIMULATION TOOLS FOR MOBILE AD -HOC NETWORKS , 2012 .
[30] Jonathan K. Millen,et al. CAPSL: Common Authentication Protocol Specification Language , 1996, NSPW '96.
[31] Luu Anh Tuan,et al. Modeling and Verifying Security Protocols Using PAT Approach , 2010, SSIRI 2010.
[32] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[33] Åsmund Sand,et al. A Secure Approach to Distributed Internet-Enabled Metrology , 2007, IEEE Transactions on Instrumentation and Measurement.
[34] Bernard Martinet,et al. NetSEC: metrology-based application for network security , 2003, Future Gener. Comput. Syst..
[35] Catherine A. Meadows,et al. A system for the specification and analysis of key management protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[36] C. Fraser,et al. Monitoring the thermal deformation of steel beams via vision metrology , 2000 .
[37] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[38] Nick Ridler,et al. Internet calibration direct to national measurement standards for automatic network analysers , 2001, IMTC 2001. Proceedings of the 18th IEEE Instrumentation and Measurement Technology Conference. Rediscovering Measurement in the Age of Informatics (Cat. No.01CH 37188).
[39] Robert K. Cunningham,et al. Why Measuring Security Is Hard , 2010, IEEE Security & Privacy.
[40] Vijay Varadharajan. Verification of network security protocols , 1989, Comput. Secur..
[41] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[42] Paul F. Syverson. A Logic for the Analysis of Cryptographic Protocols , 1990 .
[43] Stephen H. Brackin,et al. A HOL extension of GNY for automatically analyzing cryptographic protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[44] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[45] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[46] Ibrahim F. Tarrad,et al. Assessment and Comparison of Commonly used Wireless Technologies from Mobile payment Systems Perspective , 2014 .
[47] Richard A. Kemmerer,et al. Analyzing encryption protocols using formal verification techniques , 1989, IEEE J. Sel. Areas Commun..