Cross-Layer Verification of Type Flaw Attacks on Security Protocols.
Benjamin W. LongColin J. FidgeDavid A. CarringtonPublished in: ACSC (2007)
Keyphrases
- security protocols
- cross layer
- cryptographic protocols
- security mechanisms
- multi layer
- video streaming
- key management
- wireless networks
- application layer
- access control
- routing protocol
- multimedia services
- resource constrained
- rfid tags
- wireless ad hoc networks
- neural network
- video streams
- quality of service
- web services