Login
Register
Reset Password
Publish & Distribute
Publishing Solutions
Distribution Solutions
Subjects
Publications
Journals
Books
Proceedings
Publishers
Blog
Contact
Search
Cart
EUR
USD
GBP
English
English
Deutsch
Polski
Español
Français
Italiano
Home
Journals
Tatra Mountains Mathematical Publications
Volume 47 (2010): Issue 1 (December 2010)
Open Access
Formal analysis of security protocols for wireless sensor networks
Marián Novotný
Marián Novotný
| Nov 13, 2012
Tatra Mountains Mathematical Publications
Volume 47 (2010): Issue 1 (December 2010)
CCEC ‘09
About this article
Previous Article
Next Article
Abstract
References
Authors
Articles in this Issue
Preview
PDF
Cite
Share
Published Online:
Nov 13, 2012
Page range:
81 - 97
DOI:
https://doi.org/10.2478/v10127-010-0032-7
Keywords
security protocols
,
Wireless Sensor Networks
,
formal analysis
,
Dolev-Yao model of the attacker
,
data integrity
,
the applied pi-calculus.
This content is open access.