Analysing Routing Protocols: Four Nodes Topologies Are Sufficient
From MaRDI portal
Publication:2894310
DOI10.1007/978-3-642-28641-4_3zbMath1353.68020OpenAlexW32641163MaRDI QIDQ2894310
Véronique Cortier, Jan Degrieck, Stéphanie Delaune
Publication date: 29 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28641-4_3
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (3)
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later ⋮ Automated Verification of Dynamic Root of Trust Protocols ⋮ A Symbolic Framework to Analyse Physical Proximity in Security Protocols
Uses Software
This page was built for publication: Analysing Routing Protocols: Four Nodes Topologies Are Sufficient