IIT Home Page CNR Home Page

Formal techniques for security analysis in wireless systems

The goal of this chapter is to give the flavor of what has been done within the area of formal verification of secure wireless systems. Indeed, we assist to a successful proliferation of research ideas within this area. Here, we aim at illustrating popular methodologies and models, that have been applied to specific case studies, e.g., Bluetooth and IEEE 802.11 security for modeling and performing security analysis.


, 2008

Autori: Fabio Martinelli, Marinella Petrocchi
Autori IIT:

Tipo: Capitoli di libro con casa editrice internazionale
Area di disciplina: Information Technology and Communication Systems

Attività: Metodi formali per la sicurezza di sistemi ICT