Abstract

We present a technique for security proofs for on-demand routing protocols. The idea is to break down the security requirement against the protocol into the security requirement against a single honest protocol machine. The practical income is a simplified approach that provides also guidelines for designing provably secure protocols.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call