Active Bibliography

861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
869 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
545 The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks – Frank Stajano, Ross Anderson - 1999
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
828 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1132 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
1535 Security Architecture for the Internet Protocol – Randall Atkinson - 1995
505 Secure Routing for Mobile Ad Hoc Networks – Panagiotis Papadimitratos, Zygmunt Haas - 2002
827 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001