Sciweavers

1518 search results - page 3 / 304
» Cryptographic Test Correction
Sort
View
ESEC
1997
Springer
13 years 11 months ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine
FOSSACS
2009
Springer
14 years 2 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
TGC
2005
Springer
14 years 26 days ago
Model-Based Testing of Cryptographic Protocols
Dean Rosenzweig, Davor Runje, Wolfram Schulte
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 7 months ago
Iterative method for improvement of coding and decryption
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be ...
Natasa Zivic