Sciweavers

1518 search results - page 3 / 304
» Cryptographic Test Correction
Sort
View
ESEC
1997
Springer
15 years 3 months ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine
100
Voted
FOSSACS
2009
Springer
15 years 7 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
TGC
2005
Springer
15 years 5 months ago
Model-Based Testing of Cryptographic Protocols
Dean Rosenzweig, Davor Runje, Wolfram Schulte
CORR
2010
Springer
65views Education» more  CORR 2010»
14 years 12 months ago
Iterative method for improvement of coding and decryption
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be ...
Natasa Zivic