Sciweavers

1518 search results - page 7 / 304
» Cryptographic Test Correction
Sort
View
ICON
2007
IEEE
15 years 6 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
101
Voted
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
15 years 4 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
104
Voted
CEJCS
2011
80views more  CEJCS 2011»
14 years 10 days ago
Evaluating distributed real-time and embedded system test correctness using system execution traces
: Effective validation of distributed real-time and embedded (DRE) system quality-of-service (QoS) properties (e.g., event prioritization, latency, and throughput) requires testin...
James H. Hill, Pooja Varshneya, Douglas C. Schmidt
113
Voted
FORTE
2003
15 years 1 months ago
Correct Passive Testing Algorithms and Complete Fault Coverage
The aim of passive testing is to detect faults in a system while observing the system during normal operation, that is, without forcing the system to specialized inputs explicitly ...
Arun N. Netravali, Krishan K. Sabnani, Ramesh Visw...
103
Voted
DATESO
2010
131views Database» more  DATESO 2010»
14 years 10 months ago
Testing Quasigroup Identities using Product of Sequence
Non-associative quasigroups are well known combinatorial designs with many different applications. Many cryptographic algorithms based on quasigroups primitives have been published...
Eliska Ochodkova, Jiri Dvorský, Václ...