Wireless Mesh Networks - Efficient Link Scheduling, Channel Assignment and Network Planning Strategies 2012
DOI: 10.5772/49051
|View full text |Cite
|
Sign up to set email alerts
|

A Correctness Proof of a Mesh Security Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…The proof methodology of the PCL is described in . The detailed proof of the standard MSA security has been presented by using the PCL in . We derive the proof of the MKHSH scheme based on the work in and present the required modifications in order to accommodate the security requirements for our proposed SEDKR scheme.…”
Section: Logical Analysis and Formal Verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…The proof methodology of the PCL is described in . The detailed proof of the standard MSA security has been presented by using the PCL in . We derive the proof of the MKHSH scheme based on the work in and present the required modifications in order to accommodate the security requirements for our proposed SEDKR scheme.…”
Section: Logical Analysis and Formal Verificationmentioning
confidence: 99%
“…Based on the work in , Figure presents the modified strands, the invariants, and the security goals of the MA and the MKD. A strand is the sequence of actions that are being performed by the designated thread.…”
Section: Logical Analysis and Formal Verificationmentioning
confidence: 99%
See 1 more Smart Citation