-
2
-
-
3142552643
-
A key recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP)
-
May
-
A. Stubblefield, J. Ioannidis, A.D. Rubin, "A key recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP)", ACM Transactions on Information and System Security, Vol. 7, No. 2, May 2004, pp. 319-332.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 319-332
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
4
-
-
17144385343
-
-
October
-
Wi-Fi Alliance. Wi-Fi Protected Access, October 2002. URL: http://www.wi-fi.org/OpenSection/pdf/Wi-Fi Protected Access Overview.pdf
-
(2002)
Wi-Fi Protected Access
-
-
-
8
-
-
0037917924
-
An overview of SAL
-
June
-
th NASA Langley Formal Methods Workshop, June 2000, pp. 1-10.
-
(2000)
th NASA Langley Formal Methods Workshop
, pp. 1-10
-
-
Bensalem, S.1
Ganesh, V.2
Lakhnech, Y.3
Munoz, C.4
Owe, S.5
Rue, H.6
Rushby, J.7
Rusu, V.8
Saldi, H.9
Shanker, N.10
Singerman, E.11
Tiwari, A.12
-
9
-
-
0017985798
-
General technique for communications protocol validation
-
C.H. West, "General technique for communications protocol validation", IBM Journal of Research and Development, 22(4), 1978.
-
(1978)
IBM Journal of Research and Development
, vol.22
, Issue.4
-
-
West, C.H.1
-
10
-
-
0000289556
-
Formal methods: State of the art and future directions
-
M.C. Edmund, and M.W. Jeannette, "Formal methods: state of the art and future directions", ACM Computing Surveys, 28(4):626 - 643, 1996.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.4
, pp. 626-643
-
-
Edmund, M.C.1
Jeannette, M.W.2
-
12
-
-
18944390941
-
The model checker SPIN
-
G. J. Holzmann, "The model checker SPIN", Software Engineering, 23(5):279 - 295, 1997.
-
(1997)
Software Engineering
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
13
-
-
0001801746
-
Protocol verification as a hardware design aid
-
D. L. Dill, A. J. Drexler, J. Alan, Hu, and C. Han Yang, "Protocol verification as a hardware design aid", IEEE International Conference on Computer Design: VLSI in Computers and Processors, pages 522-525, 1992.
-
(1992)
IEEE International Conference on Computer Design: VLSI in Computers and Processors
, pp. 522-525
-
-
Dill, D.L.1
Drexler, A.J.2
Alan, J.3
Hu4
Han Yang, C.5
-
16
-
-
0020720357
-
On the security of public key protocols
-
March
-
D. Dolev and A. Yao, "On the security of public key protocols", IEEE transactions on Information Theory, 29(2):198-208, March 1989.
-
(1989)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
17
-
-
0004207324
-
-
L. David, K. Detlefs, M. Rustan, Leino, G. Nelson, and B. J. Saxe, "Extended static checking", 1998.
-
(1998)
Extended Static Checking
-
-
David, L.1
Detlefs, K.2
Rustan, M.3
Leino4
Nelson, G.5
Saxe, B.J.6
-
19
-
-
84975277890
-
Checking system rules using System specific, programmer written compiler extensions
-
October
-
D.R. Engler, B. Chelf, A. Chou, and S. Hallem, "Checking system rules using System specific, programmer written compiler extensions", Proc. of the Fourth Symposium on Operating Systems Design and Implementation, October 2000.
-
(2000)
Proc. of the Fourth Symposium on Operating Systems Design and Implementation
-
-
Engler, D.R.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
20
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
St.Louis, Missouri, USA; 15 - 21 May
-
J. Jürjens, "Sound Methods and Effective Tools for Model-based Security Engineering with UML", 27th International Conference on Software Engineering, St.Louis, Missouri, USA; 15 - 21 May 2005
-
(2005)
27th International Conference on Software Engineering
-
-
Jürjens, J.1
-
21
-
-
11844280302
-
Is this a revolutionary idea, or not?
-
Robert L. Glass, "Is this a revolutionary idea, or not?", Communications of the ACM, 47(11):23 -25, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.11
, pp. 23-25
-
-
Glass, R.L.1
-
22
-
-
11144234187
-
A model for object based distributed processing using behavior trees
-
Nov. Cambridge MA, USA
-
Sithirasenan, E. Muthukkumarasamy, V. "A Model for Object Based Distributed Processing Using Behavior Trees", Proc. of the Eighth IASTED International Conference on Software Engineering and Applications, Nov. 2004, Cambridge MA, USA, pp 477-482.
-
(2004)
Proc. of the Eighth IASTED International Conference on Software Engineering and Applications
, pp. 477-482
-
-
Sithirasenan, E.1
Muthukkumarasamy, V.2
-
23
-
-
15844430702
-
An environment for building a system out of its requirements
-
Linz, Austria
-
C. Smith, L. Winter, I. Hayes, R.G. Dromey, P. Lindsay, and D. Carrington, "An Environment for Building a System Out of Its Requirements," Tools Track, 19th IEEE International Conference on Automated Software Engineering, Linz, Austria, 2004.
-
(2004)
Tools Track, 19th IEEE International Conference on Automated Software Engineering
-
-
Smith, C.1
Winter, L.2
Hayes, I.3
Dromey, R.G.4
Lindsay, P.5
Carrington, D.6
-
25
-
-
33646751910
-
An automated failure mode and effect analysis based on high-level design specification with behavior trees
-
L. Grunske, A. Peter, P. Lindsay, N. Yatapanage, K. Winter, "An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees", International Conference on Integrated Formal Methods, IFM'05, 2005, 129-149
-
(2005)
International Conference on Integrated Formal Methods, IFM'05
, pp. 129-149
-
-
Grunske, L.1
Peter, A.2
Lindsay, P.3
Yatapanage, N.4
Winter, K.5
-
26
-
-
0037917924
-
An overview of SAL
-
Bensalem, S., Ganesh, V., Lakhnech, Y., Muñoz, C., Owre, S., Rueß, H., Rushby, J., Rusu, V., Saïdi, H., Shankar, N., Singerman, E., and Tiwari, A., "An Overview of SAL," presented at LFM 2000: Fifth NASA Langley Formal Methods Workshop, 2000
-
(2000)
LFM 2000: Fifth NASA Langley Formal Methods Workshop
-
-
Bensalem, S.1
Ganesh, V.2
Lakhnech, Y.3
Muñoz, C.4
Owre, S.5
Rueß, H.6
Rushby, J.7
Rusu, V.8
Saïdi, H.9
Shankar, N.10
Singerman, E.11
Tiwari, A.12
-
28
-
-
0036980638
-
Your 802.11 wireless network has no cloths
-
Dec.
-
Arbaugh, W.A. Shankar, N. Wan, J. "Your 802.11 Wireless Network Has No Cloths", IEEE Wireless Communications, Dec. 2002, pp. 44-51.
-
(2002)
IEEE Wireless Communications
, pp. 44-51
-
-
Arbaugh, W.A.1
Shankar, N.2
Wan, J.3
-
29
-
-
0013046241
-
An initial security analysis of the IEEE 802.1X standard
-
National Institute of Standards, February
-
Mishra, A. Arbaugh, W.A. "An Initial Security Analysis of the IEEE 802.1X Standard", Critical Infrastructure Grant, National Institute of Standards, February 2002.
-
(2002)
Critical Infrastructure Grant
-
-
Mishra, A.1
Arbaugh, W.A.2
|