Formal models and analysis of secure multicast in wired and wireless networks
From MaRDI portal
(Redirected from Publication:1040779)
Recommendations
Cites work
- scientific article; zbMATH DE number 1670837 (Why is no real title available?)
- scientific article; zbMATH DE number 3776831 (Why is no real title available?)
- scientific article; zbMATH DE number 42752 (Why is no real title available?)
- scientific article; zbMATH DE number 1487487 (Why is no real title available?)
- scientific article; zbMATH DE number 1497862 (Why is no real title available?)
- A framework for security analysis of mobile wireless networks
- A process algebra for timed systems
- A simple framework for real-time cryptographic protocol analysis with compositional proof rules
- A team automaton scenario for the analysis of security properties of communication protocols
- Analysis of security protocols as open systems
- Formal analysis of some timed security properties in wireless protocols.
- Foundations of Security Analysis and Design II
- How to sign digital streams
- SPINS: Security protocols for sensor networks
- Theoretical Computer Science
Cited in
(4)
This page was built for publication: Formal models and analysis of secure multicast in wired and wireless networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1040779)