References
1. I. Aad, J.-P. Hubaux, and E. W. Knightly. “Denial of Service Resilience in Ad Hoc Networks,” Proceedings of the Tenth Annual International Conference on Mobile Computing and Networking pp. 202–215 (Sep. 2004).
2. M. Abadi. “Explicit Communication Revisited: Two New Attacks on Authentication Protocols,” IEEE Transactions on Software Engineering 23(3) pp. 185–196 (Mar. 1997).
3. M. Abadi and C. Fournet. “Access Control Based on Execution History,” Proceedings of the 2003 Symposium on Network and Distributed System Security pp. 107–121 (Feb. 2003).
4. M. Abadi and R. Needham. “Prudent Engineering Practice for Cryptographic Protocols,” IEEE Transactions on Software Engineering 22(1) pp. 6–15 (Jan. 1996).
5. R. P. Abbott, J. S. Chin, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access