Distance bounding protocols: authentication logic analysis and collusion attacks
Main Authors: | Meadows, C, Poovendran, R, Pavlovic, D, Chang, L, Syverson, P |
---|---|
格式: | 圖書 |
出版: |
2006
|
相似書籍
-
Distance Hijacking Attacks on Distance Bounding Protocols
由: Cremers, C, et al.
出版: (2012) -
Distance hijacking attacks on distance bounding protocols
由: Rasmussen, K, et al.
出版: (2012) -
An encapsulated authentication logic for reasoning about key distribution protocols
由: Cervesato, I, et al.
出版: (2005) -
Deriving‚ attacking and defending the GDOI protocol
由: Meadows, C, et al.
出版: (2004) -
Bayesian Authentication: Quantifying Security of the Hancke−Kuhn Protocol
由: Pavlovic, D, et al.
出版: (2010)