The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for openSSL with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2005 (17) 2006-2007 (19) 2008-2010 (16) 2011-2016 (20) 2017-2019 (15) 2020-2023 (10)
Publication types (Num. hits)
article(26) book(1) inproceedings(69) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 105 occurrences of 68 keywords

Results
Found 97 publication records. Showing 97 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
106Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
72Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF debian, openssl, entropy, survey, attacks, prng
72Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi An efficient implementation of trusted channels based on openssl. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation
59Onur Aciiçmez, Werner Schindler A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication
51Sung-Ja Choi, Yeon-hee Kang, Gang-Soo Lee A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34David Ahmad Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI Compromise. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Adam L. Young, Moti Yung A Timing-Resistant Elliptic Curve Backdoor in RSA. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Twisted elliptic curves, RSA, subliminal channel, kleptography
34Onur Aciiçmez, Jean-Pierre Seifert Cheap Hardware Parallelism Implies Cheap Security. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Vipul Gupta, Douglas Stebila, Sheueling Chang Shantz Integrating elliptic curve cryptography into the web's security infrastructure. Search on Bibsonomy WWW (Alternate Track Papers & Posters) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF openSSL, elliptic curve cryptography, apache, mozilla
26Claudio Alessio, Andrea Vesco A Novel DID Method Leveraging the IOTA Tangle and its Integration into OpenSSL. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Claudio Alessio, Andrea Vesco A Novel DID Method Leveraging the IOTA Tangle and Its Integration into OpenSSL. Search on Bibsonomy BLOCKCHAIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Chihiro Tomita, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, Masakatu Morii Extracting the Secrets of OpenSSL with RAMBleed. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Parker Hanson, Benjamin Winters, Eric Mercer, Brett Decker Verifying the SHA-3 Implementation from OpenSSL with the Software Analysis Workbench. Search on Bibsonomy SPIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26James Walden OpenSSL 3.0.0: An exploratory case study. Search on Bibsonomy MSR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Cesar Pereida García Side-Channel Analysis and Cryptography Engineering: Getting OpenSSL Closer to Constant-Time. Search on Bibsonomy 2022   RDF
26Brett Decker, Benjamin Winters, Eric Mercer Towards Verifying SHA256 in OpenSSL with the Software Analysis Workbench. Search on Bibsonomy NFM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26James Walden The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
26Stanislav S. Malakhov Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
26James Walden The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL. Search on Bibsonomy MSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL's protection on ARM and Intel CPU. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Vincenzo DiLuoffo, William R. Michalson, Berk Sunar Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
26Jizhi Wang The Prediction of Serial Number in OpenSSL's X.509 Certificate. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Akira Takahashi 0002, Mehdi Tibouchi Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26Akira Takahashi 0002, Mehdi Tibouchi Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. Search on Bibsonomy EuroS&P The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Hyunki Kim, Jinhyeok Oh, Changuk Jang, Okyeon Yi, Juhong Han, Hansaem Wi, Chanil Park Analysis of the Noise Source Entropy Used in OpenSSL's Random Number Generation Mechanism. Search on Bibsonomy ICTC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Wenbo Wang, Shuqin Fan Attacking OpenSSL ECDSA with a small amount of side-channel information. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Urbi Chatterjee, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Sweta Pati, Debashis Mahata, Mukesh M. Prabhu PUFSSL: An OpenSSL Extension for PUF based Authentication. Search on Bibsonomy DSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley OpenSSL Bellcore's Protection Helps Fault Attack. Search on Bibsonomy DSD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Locke Callan, Alenka G. Zajic, Milos Prvulovic One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
26Chunhua Xiao, Yuhua Xie, Lei Zhang 0072 AEAS - Towards High Energy-efficiency Design for OpenSSL Encryption Acceleration through HW/SW Co-design. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Martin Ukrop, Vashek Matyas Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability. Search on Bibsonomy CT-RSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Yuval Yarom, Daniel Genkin, Nadia Heninger CacheBleed: a timing attack on OpenSSL constant-time RSA. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Christian Janze Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed. Search on Bibsonomy Bled eConference The full citation details ... 2017 DBLP  BibTeX  RDF
26Denis Butin, Julian Wälde, Johannes Buchmann 0001 Post-quantum authentication in OpenSSL with hash-based signatures. Search on Bibsonomy ICMU The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Yuval Yarom, Daniel Genkin, Nadia Heninger CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
26Falko Strenzke An Analysis of OpenSSL's Random Number Generator. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
26Shuqin Fan, Wenbo Wang, Qingfeng Cheng Attacking OpenSSL Implementation of ECDSA with a Few Signatures. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Pasquale Malacaria, Michael Tautschnig, Dino Distefano Information Leakage Analysis of Complex C Code and Its application to OpenSSL. Search on Bibsonomy ISoLA (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Matthieu Jimenez, Mike Papadakis, Yves Le Traon An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. Search on Bibsonomy APSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Falko Strenzke An Analysis of OpenSSL's Random Number Generator. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Joeri de Ruiter A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Debapriya Basu Roy, Shubham Agrawal, Chester Rebeiro, Debdeep Mukhopadhyay Accelerating OpenSSL's ECC with low cost reconfigurable hardware. Search on Bibsonomy ISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Yuval Yarom, Daniel Genkin, Nadia Heninger CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Soo Hyeon Kim, Daewan Han, Dong Hoon Lee 0002 Practical Effect of the Predictability of Android OpenSSL PRNG. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26David Wong 0003 Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
26Yongge Wang, Tony Nicol On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL. Search on Bibsonomy Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel Verified Correctness and Security of OpenSSL HMAC. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
26Yuval Yarom, Naomi Benger Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
26Poul-Henning Kamp Please Put OpenSSL Out of Its Misery. Search on Bibsonomy ACM Queue The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng OpenSSL HeartBleed: Security Management of Implements of Basic Protocols. Search on Bibsonomy 3PGCIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Yongge Wang, Tony Nicol Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL. Search on Bibsonomy ESORICS (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Soo Hyeon Kim, Daewan Han, Dong Hoon Lee 0002 Predictability of Android OpenSSL's pseudo random number generator. Search on Bibsonomy CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Johannes Gilger, Johannes Barnickel, Ulrike Meyer GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Emilia Käsper Fast Elliptic Curve Cryptography in OpenSSL. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Julia Lawall, Ben Laurie, René Rydhof Hansen, Nicolas Palix, Gilles Muller Finding Error Handling Bugs in OpenSSL Using Coccinelle. Search on Bibsonomy EDCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Li Gui-hong, Zheng Hua, Li Gui-zhi Building a Secure Web Server Based on OpenSSL and Apache. Search on Bibsonomy ICEE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Vishnu P. Nambiar, Mohamed Khalil Hani, Muhammad Munim Ahmad Zabidi Accelerating the AES encryption function in OpenSSL for embedded systems. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Martin Bartosch Das OpenSSL-Debakel. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
26Marc Joye, Michael Tunstall Securing OpenSSL against Micro-Architectural Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
26Ben Laurie Apache/OpenSSL/DNSSEC. Search on Bibsonomy LISA The full citation details ... 2005 DBLP  BibTeX  RDF
26John Viega, Matt Messier, Pravir Chandra Network security using OpenSSL - cryptography for secure communications. Search on Bibsonomy 2002   RDF
17Gregory S. Thomas, Bill Nickless, David R. Thiede, Ian Gorton, Bill J. Pitre, Jason E. Christy, Liz Faultersack, Jeffery A. Mauth T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, Gerardo Pelosi Design of a parallel AES for graphics hardware using the CUDA framework. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Billy Bob Brumley, Risto M. Hakala Cache-Timing Template Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cache-timing attacks, elliptic curve cryptography, side channel attacks
17Ray-Yaung Chang, Andy Podgurski, Jiong Yang 0001 Discovering Neglected Conditions in Software by Mining Dependence Graphs. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Diana Berbecaru, Luca Albertalli An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF generic FSS schemes, double cache technique, backward secrecy
17Florina Almenárez, Andrés Marín López, Daniel Díaz Sánchez, Alberto Cortés, Celeste Campo, Carlos García-Rubio Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certificate validation, open toolkit, X.509 certificates
17Danilo Gligoroski, Suzana Andova, Svein J. Knapskog On the Importance of the Key Separation Principle for Different Modes of Operation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quasigroup string transformations, block ciphers, modes of operation
17Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation
17Laurent Bernaille, Renata Teixeira Early Recognition of Encrypted Applications. Search on Bibsonomy PAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
17Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel Lussenburg, Felix Rauch Model Checking Software at Compile Time. Search on Bibsonomy TASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
17Guido Rotondi, Gianpiero Guerrera A consistent history authentication protocol. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dentification, authentication, trust, non repudiation, SSL
17José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
17Martin Hlavác, Tomás Rosa Extended Hidden Number Problem and Its Cryptanalytic Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DSA implementation, hyper-threading, lattice, sliding window, side channel analysis, cache analysis
17Ji Wang 0001, Xiaodong Yi 0002, Xuejun Yang Towards a Framework for Scalable Model Checking of Concurrent C Programs. Search on Bibsonomy ISoLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Allen Michalski, Duncan A. Buell A Scalable Architecture for RSA Cryptography on Large FPGAs. Search on Bibsonomy FPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel Lussenburg, Felix Rauch Goanna - A Static Model Checker. Search on Bibsonomy FMICS/PDMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
17Chang Liu 0028, En Ye, Debra J. Richardson Software Library Usage Pattern Extraction Using a Software Model Checker. Search on Bibsonomy ASE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Joseph Bonneau, Ilya Mironov Cache-Collision Timing Attacks Against AES. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, timing attack
17Takahiro Shinagawa SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç Improving Brumley and Boneh timing attack on unprotected SSL implementations. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, timing attacks, side-channel cryptanalysis
17Jean Goubault-Larrecq, Fabrice Parrennes Cryptographic Protocol Analysis on Real C Code. Search on Bibsonomy VMCAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Xiaodong Yi 0002, Ji Wang 0001, Xuejun Yang Verification of C Programs using Slicing Execution. Search on Bibsonomy QSIC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith Modular Verification of Software Components in C. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17José A. Montenegro, Fernando Moya A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Jinlin Yang, David Evans 0001 Automatically Inferring Temporal Properties for Program Evolution . Search on Bibsonomy ISSRE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Christian Rinderknecht Proving a Soundness Property for the Joint Design of ASN.1 and the Basic Encoding Rules. Search on Bibsonomy SAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Abstract Syntax Notation One, Basic Encoding Rules, formal methods, protocol, specification, vulnerabilities, BER, ASN.1
17Sagar Chaki, Edmund M. Clarke, Joël Ouaknine, Natasha Sharygina, Nishant Sinha 0001 State/Event-Based Software Model Checking. Search on Bibsonomy IFM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle The Design and Implementation of Protocol-Based Hidden Key Recovery. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Analyzing the energy consumption of security protocols. Search on Bibsonomy ISLPED The full citation details ... 2003 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
17Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith Modular Verification of Software Components in C. Search on Bibsonomy ICSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Panu Hämäläinen, Marko Hännikäinen, Markku Niemi, Timo Hämäläinen 0001 Performance evaluation of Secure Remote Password protocol. Search on Bibsonomy ISCAS (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel F. Finchelstein, Edouard Goupy, Douglas Stebila An End-to-End Systems Approach to Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #97 of 97 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license