Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR
暂无分享,去创建一个
[1] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[2] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[3] Gavin Lowe. Analyzing a Library of Security Protocols using Casper and FDR , 1999 .
[4] Ieee Microwave Theory,et al. Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems — Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands , 2003 .
[5] Pang Liaojun,et al. Key Management Protocol of the IEEE 802.16e , 2007 .
[6] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[7] Chin-Tser Huang,et al. Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.
[8] Manton M. Matthews,et al. Security protocols in wirelessman , 2008 .
[9] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[10] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[11] Ender Yuksel,et al. Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .
[12] A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[13] Chin-Tser Huang,et al. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.
[14] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[15] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[16] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[17] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..