Validating the Use of BAN LOGIC

JM Sierra, JC Hernández, A Alcaide… - … Science and Its …, 2004 - Springer
Most attacks against security protocols are due to their vulnerable designs. These type of
protocols are usually the base which many other protocols and applications are built upon …

A connectionless approach to mobile ad hoc networks

YH Ho, AH Ho, KA Hua… - Proceedings. ISCC 2004 …, 2004 - ieeexplore.ieee.org
Today's communication techniques for mobile ad hoc networks take a connection-oriented
approach. Mobile nodes need to discover routes and establish a connection before they can …

[PDF][PDF] Анализ подходов к верификации функций безопасности и мобильности

АС Косачев, ВН Пономаренко - М.: Триумф, 2004 - ispras.ru
Компьютерная безопасность и мобильность являются одними из самых актуальных
областей исследования и разработок. В первую очередь это связано с тем, что всё …

On timeliness of a fair non-repudiation protocol

L Botao, L Junzhou - Proceedings of the 3rd international conference on …, 2004 - dl.acm.org
In 1996, J. Zhou and D. Gollmann proposed a fair non-repudiation protocol, which was
unfair in fact for its lack of timeliness. K. Kim, S. Park and J. Baek improved it by adding time …

[PDF][PDF] Designing anonymity-a formal basis for identity hiding

J Wright, S Stepney, JA Clark, J Jacob - Internal yellow report, York …, 2004 - Citeseer
Designing Anonymity: A Formal Basis for Identity Hiding Page 1 Designing Anonymity: A
Formal Basis for Identity Hiding Joss Wright, Susan Stepney, John A. Clark, Jeremy Jacob {joss,susan,jac,jeremy.jacob}@cs.york.ac.uk …

Assessment aggregation in the evidential reasoning approach to MADM under uncertainty: Orthogonal versus weighted sum

VN Huynh, Y Nakamori, TB Ho - Annual Asian Computing Science …, 2004 - Springer
In this paper, we revisit the evidential reasoning (ER) approach to multiple-attribute decision
making (MADM) with uncertainty. The attribute aggregation problem in MADM under …

Testing times: On model-driven test generation for non-deterministic real-time systems

E Brinksma - … Fourth International Conference on Application of …, 2004 - ieeexplore.ieee.org
Summary form only given. Although testing has always been the most important technique
for the validation of software systems it has only become a topic of serious academic …

[图书][B] An Asymmetrical End-to-end Mobile Payment Protocol for Mobile Commerce

LS He - 2004 - search.proquest.com
Mobile commerce (M-Commerce) enables mobile users to access Internet services while on
the move, anywhere and anytime. M-Payment is an essential part of M-Commerce, where …

Simulation based validation of authentication protocols

KG Indiradevi, VS Nair - Journal of Integrated Design and …, 2004 - content.iospress.com
Authentication protocols help to establish trust about the identities of communicating entities.
Along with authorization and data confidentiality, authentication forms a critical component …

[引用][C] 一种新的安全协议形式化验证方法

侯峻峰, 张磊, 黄连生 - 计算机研究与发展, 2004