Formal models and analysis of secure multicast in wired and wireless networks
DOI10.1007/S10817-008-9112-7zbMATH Open1191.68036OpenAlexW2044781276MaRDI QIDQ1040779FDOQ1040779
Authors: Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi
Publication date: 25 November 2009
Published in: Journal of Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10817-008-9112-7
Recommendations
Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- SPINS: Security protocols for sensor networks
- Title not available (Why is that?)
- A process algebra for timed systems
- A framework for security analysis of mobile wireless networks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Foundations of Security Analysis and Design II
- Analysis of security protocols as open systems
- Title not available (Why is that?)
- A simple framework for real-time cryptographic protocol analysis with compositional proof rules
- How to sign digital streams
- A team automaton scenario for the analysis of security properties of communication protocols
- Title not available (Why is that?)
- Theoretical Computer Science
- Formal analysis of some timed security properties in wireless protocols.
Cited In (4)
Uses Software
This page was built for publication: Formal models and analysis of secure multicast in wired and wireless networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1040779)