Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Author:
Publisher
Springer Berlin Heidelberg
Link
http://link.springer.com/content/pdf/10.1007/978-3-540-25984-8_8.pdf
Reference38 articles.
1. Lecture Notes in Artificial Intelligence;W. Ahrendt,2002
2. Asokan, N., Ginzboorg, P.: Key-agreement in ad-hoc networks. Computer Communications 23(17), 1627–1637 (2000)
3. Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18(4), 628–639 (2000)
4. Bachmair, L.: Canonical Equational Proofs. Birkhauser, Basel (1991)
5. Bachmair, L., Ganzinger, H.: Completion of First-order clauses with equality by strict superposition. In: Proceedings 2nd International CTRS Workshop, Montreal, Canada, pp. 162–180 (1990) (extended abstract)
Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Formal verification of secure group communication protocols modelled in UML;Innovations in Systems and Software Engineering;2010-01-28
2. Finite Models in FOL-Based Crypto-Protocol Verification;Foundations and Applications of Security Analysis;2009
3. The Importance of Non-theorems and Counterexamples in Program Verification;Verified Software: Theories, Tools, Experiments;2008
4. Automated verification of a key management architecture for hierarchical group protocols;Annales Des Télécommunications;2007-11
5. Attacking Group Multicast Key Management Protocols Using Coral;Electronic Notes in Theoretical Computer Science;2005-03
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3