The simulation and comparison of routing attacks on DSR protocol

  • Authors:
  • Jiwen Cai;Ping Yi;Ye Tian;Yongkai Zhou;Ning Liu

  • Affiliations:
  • Information security national engineering laboratory, School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China;Inf. security national eng. laboratory, School of Inf. Security Eng., Shanghai Jiao Tong Univ., Shanghai, China and Key Laboratory of Child Development and Learning Science of Ministry of Educatio ...;Information security national engineering laboratory, School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China;Information security national engineering laboratory, School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China;Information security national engineering laboratory, School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China

  • Venue:
  • WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Non-repudiation service is crucial to electronic commerce. We have made some research of ATL logic method and its applications in multi-party security protocols formalized analysis. A typical multi-party non-repudiation protocol is modeled and analyzed ...