Distance bounding protocols: authentication logic analysis and collusion attacks
Główni autorzy: | Meadows, C, Poovendran, R, Pavlovic, D, Chang, L, Syverson, P |
---|---|
Format: | Książka |
Wydane: |
2006
|
Podobne zapisy
-
Distance Hijacking Attacks on Distance Bounding Protocols
od: Cremers, C, i wsp.
Wydane: (2012) -
Distance hijacking attacks on distance bounding protocols
od: Rasmussen, K, i wsp.
Wydane: (2012) -
An encapsulated authentication logic for reasoning about key distribution protocols
od: Cervesato, I, i wsp.
Wydane: (2005) -
Deriving‚ attacking and defending the GDOI protocol
od: Meadows, C, i wsp.
Wydane: (2004) -
Bayesian Authentication: Quantifying Security of the Hancke−Kuhn Protocol
od: Pavlovic, D, i wsp.
Wydane: (2010)