共 25 条
- [1] Papadimitratos P., Haas Z.J., Secure routing for mobile ad hoc networks, Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conf, (2002)
- [2] Pfitzmann B., Waidner M., A model for asynchronous reactive systems and its application to secure message transmission, Proc. of the IEEE Symp. on Security and Privacy. IEEE, pp. 184-200, (2001)
- [3] Zapata M.G., Asokan N., Securing ad hoc routing protocols, Proc. of the ACM Workshop on Wireless Security, pp. 1-10, (2002)
- [4] Hu Y.C., Perrig A., Johnson D., Ariadne: A secure on-demand routing prortocol for ad hoc networks, Wireless Networks, 11, 1-2, pp. 21-38, (2005)
- [5] Qing S.H., Design and logic analysis of security protocols, Journal of Software, 14, 7, pp. 1300-1309, (2003)
- [6] Zakiuddin I., Goldsmith M., Whittaker P., Gardiner P., A methodology for mode-checking ad-hoc networks, (2003)
- [7] Nanz S., Hankin C., A framework for security analysis of mobile wireless networks, Theoretical Computer Science, 367, 1, pp. 203-227, (2006)
- [8] Dolev D., Yao A.C., On the security of public key protocols, IEEE Trans. on Information Theory, 29, 2, pp. 198-208, (1983)
- [9] Cardelli L., Gordon A.D., Mobile ambients, Theoretical Computer Science, 240, 1, pp. 177-213, (2000)
- [10] Castagna G., Vitek J., Nardelli F.Z., The seal calculus, Information and Computation, 201, 1, pp. 1-54, (2005)