Deriving‚ attacking and defending the GDOI protocol
Main Authors: | Meadows, C, Pavlovic, D |
---|---|
Format: | Conference item |
Published: |
Springer Verlag
2004
|
Similar Items
-
Deriving secrecy properties in key establishment protocols
by: Pavlovic, D, et al.
Published: (2006) -
Distance bounding protocols: authentication logic analysis and collusion attacks
by: Meadows, C, et al.
Published: (2006) -
Defending Against Backdoor Attacks by Quarantine Training
by: Chengxu Yu, et al.
Published: (2024-01-01) -
Defending against cross-site scripting attacks
by: Shar, Lwin Khin, et al.
Published: (2013) -
Battling Phages: How Bacteria Defend against Viral Attack.
by: Kimberley D Seed
Published: (2015-06-01)