Modeling and verifying ad hoc routing protocols
From MaRDI portal
Publication:462483
DOI10.1016/j.ic.2014.07.004zbMath1360.68199OpenAlexW2044186122MaRDI QIDQ462483
Mathilde Arnaud, Stéphanie Delaune, Véronique Cortier
Publication date: 20 October 2014
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2014.07.004
Uses Software
Cites Work
- A framework for security analysis of mobile wireless networks
- On the symbolic reduction of processes with cryptographic functions.
- SPINS: Security protocols for sensor networks
- Deciding security properties for cryptographic protocols. application to key cycles
- Mobile values, new names, and secure communication
- Computer Aided Verification
This page was built for publication: Modeling and verifying ad hoc routing protocols