Formal techniques for security analysis in wireless systems (Contributo in volume (capitolo o saggio))

Type
Label
  • Formal techniques for security analysis in wireless systems (Contributo in volume (capitolo o saggio)) (literal)
Anno
  • 2008-01-01T00:00:00+01:00 (literal)
Alternative label
  • [1] Martinelli F., [1] Petrocchi M. (2008)
    Formal techniques for security analysis in wireless systems
    Troubador Publishing, Leicester (Regno Unito) in Security and Privacy in Wireless and Mobile Networking, 2008
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • [1] Martinelli F., [1] Petrocchi M. (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
  • Codice Puma: cnr.iit/2008-A1-001 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#citta
  • Leicester UK (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
  • Security and Privacy in Wireless and Mobile Networking (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#descrizioneSinteticaDelProdotto
  • The goal of this chapter is to give the flavor of what has been done within the area of formal verification of secure wireless systems. Indeed, we assist to a successful proliferation of research ideas within this area. Here, we aim at illustrating popular methodologies and models, that have been applied to specific case studies, e.g., Bluetooth and IEEE 802.11 security for modeling and performing security analysis. (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • [1] IIT-CNR, Pisa, Italy (literal)
Titolo
  • Formal techniques for security analysis in wireless systems (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#inCollana
  • Security and Privacy in Wireless and Mobile Networking (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 9781905886906 (literal)
Abstract
  • The goal of this chapter is to give the flavor of what has been done within the area of formal verification of secure wireless systems. Indeed, we assist to a successful proliferation of research ideas within this area. Here, we aim at illustrating popular methodologies and models, that have been applied to specific case studies, e.g., Bluetooth and IEEE 802.11 security for modeling and performing security analysis. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it