Sciweavers

1466 search results - page 27 / 294
» Completeness of the Authentication Tests
Sort
View
ICSE
2004
IEEE-ACM
14 years 7 months ago
Automated Generation of Test Programs from Closed Specifications of Classes and Test Cases
Most research on automated specification-based software testing has focused on the automated generation of test cases. Before a software system can be tested, it must be set up ac...
Wee Kheng Leow, Siau-Cheng Khoo, Yi Sun
ACSD
2003
IEEE
102views Hardware» more  ACSD 2003»
13 years 11 months ago
Specification Coverage Aided Test Selection
In this paper test selection strategies in formal conformance testing are considered. As the testing conformance relation we use the ioco relation, and extend the previously prese...
Tuomo Pyhälä, Keijo Heljanko
EUROCRYPT
2005
Springer
14 years 1 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 7 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller