Signal-flow-based analysis of wireless security protocols
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 819814 (Why is no real title available?)
- scientific article; zbMATH DE number 3361677 (Why is no real title available?)
- A moment generating function based approach for evaluating extended stochastic Petri Nets
- A quantitative study of two attacks
- Authenticated key exchange secure against dictionary attacks
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Fundamentals of Wireless Communication
- Key storage in secure networks
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Pairing-Friendly Elliptic Curves of Prime Order
- Protocols for authentification and key establishment
- Provably secure non-interactive key distribution based on pairings
- Wireless Information-Theoretic Security
Cited in
(8)- On the multi-user security of LWE-based NIKE
- Non-interactive key exchange
- A clean slate approach to secure wireless networking
- Wireless-channel key exchange
- Analysis of two countermeasures against the signal leakage attack
- Towards tight adaptive security of non-interactive key exchange
- Applied Cryptography and Network Security
- Investigation of signal and message manipulations on the wireless channel
This page was built for publication: Signal-flow-based analysis of wireless security protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q385716)