Signal-flow-based analysis of wireless security protocols
From MaRDI portal
Publication:385716
DOI10.1016/j.ic.2013.03.004zbMath1277.68029OpenAlexW2025277402MaRDI QIDQ385716
Murtaza Zafer, Elizabeth A. Quaglia, Kenneth G. Paterson, Don Towsley, Çağatay Çapar, Dennis L. Goeckel
Publication date: 3 December 2013
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2013.03.004
Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Key storage in secure networks
- Protocols for authentification and key establishment
- Provably secure non-interactive key distribution based on pairings
- Wireless Information-Theoretic Security
- A moment generating function based approach for evaluating extended stochastic Petri Nets
- Fundamentals of Wireless Communication
- Pairing-Friendly Elliptic Curves of Prime Order
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
This page was built for publication: Signal-flow-based analysis of wireless security protocols