-
3
-
-
10044293457
-
Comparing Passwords, Tokens, and Biometrics for User Authentication
-
L. OGorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication, " Proceedings of the IEEE, vol. 91, no. 12, pp. 2021-2040, 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
OGorman, L.1
-
7
-
-
0037036274
-
Automatic verification of real-time systems with discrete probability distributions
-
M. Kwiatkowska, G. Norman, R. Segala, and J. Sproston, "Automatic verification of real-time systems with discrete probability distributions, " Theor. Comput. Sci., vol. 282, no. 1, pp. 101-150, 2002.
-
(2002)
Theor. Comput. Sci
, vol.282
, Issue.1
, pp. 101-150
-
-
Kwiatkowska, M.1
Norman, G.2
Segala, R.3
Sproston, J.4
-
8
-
-
70350543796
-
Aspier: An automated framework for verifying security protocol implementations
-
in
-
S. Chaki and A. Datta, "Aspier: An automated framework for verifying security protocol implementations, " in Computer Security Foundations Workshop, 2009, pp. 172-185.
-
(2009)
Computer Security Foundations Workshop
, pp. 172-185
-
-
Chaki, S.1
Datta, A.2
-
9
-
-
0039334690
-
Verifying security protocols with brutus
-
October
-
E. M. Clarke, S. Jha, and W. Marrero, "Verifying security protocols with brutus, " ACM Trans. Softw. Eng. Methodol., vol. 9, pp. 443-487, October 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
10
-
-
79953897671
-
A framework for probabilistic model checking of security protocols using coloured stochastic activity networks and pdetool
-
in
-
M. Akbarzadeh and M. Azgomi, "A framework for probabilistic model checking of security protocols using coloured stochastic activity networks and pdetool, " in Telecommunications (IST), 2010 5th International Symposium on, dec. 2010, pp. 210-215.
-
(2010)
Telecommunications (IST), 5th International Symposium on, dec. 2010
, pp. 210-215
-
-
Akbarzadeh, M.1
Azgomi, M.2
-
11
-
-
33845202577
-
Analysis of probabilistic contract signing
-
G. Norman and V. Shmatikov, "Analysis of probabilistic contract signing, " Journal of Computer Security, vol. 14, no. 6, pp. 561-589, 2006.
-
(2006)
Journal of Computer Security
, vol.14
, Issue.6
, pp. 561-589
-
-
Norman, G.1
Shmatikov, V.2
-
12
-
-
62349111895
-
Streaming media intrusion detection through interacting protocol state machines
-
Y. Xin, Y. Shao-hua, L. Yan, and M. Jian-hua, "Streaming media intrusion detection through interacting protocol state machines, " Future Generation Communication and Networking, vol. 1, pp. 441-444, 2008.
-
(2008)
Future Generation Communication and Networking
, vol.1
, pp. 441-444
-
-
Xin, Y.1
Shao-hua, Y.2
Yan, L.3
Jian-hua, M.4
-
13
-
-
62449107468
-
Dos and ddos attack's possibility verification on streaming media application
-
C. Lei and Y. Dejian, "Dos and ddos attack's possibility verification on streaming media application, " Information Science and Engieering, International Symposium on, vol. 2, pp. 63-67, 2008.
-
(2008)
Information Science and Engieering, International Symposium on
, vol.2
, pp. 63-67
-
-
Lei, C.1
Dejian, Y.2
-
14
-
-
34547564714
-
Secure voip: Call establishment and media protection
-
in
-
J. Bilien, E. Eliasson, J. Orrblad, and J. olov Vatn, "Secure voip: call establishment and media protection, " in In 2nd Workshop on Securing Voice over IP, 2005.
-
(2005)
In 2nd Workshop on Securing Voice over IP
-
-
Bilien, J.1
Eliasson, E.2
Orrblad, J.3
Olov Vatn, J.4
-
15
-
-
84865144783
-
-
last visited: June
-
U. Team, "UPPAAL-, " http://http://www.uppaal.org, last visited: June 2011.
-
(2011)
Uppaal
-
-
Team, U.1
-
16
-
-
79959950872
-
Nims information security threat methodology
-
Mitre, Center for Advanced Aviation System Development, McLean, Virgini, August
-
M. D. Abrams, "Nims information security threat methodology, " MITRE, Center for Advanced Aviation System Development, McLean, Virgini, Mitre Technical Report MTR 98 W000009, August 1998.
-
(1998)
Mitre Technical Report MTR 98 W000009
-
-
Abrams, M.D.1
-
17
-
-
0003161907
-
An analysis of stochastic shortest path problems
-
August
-
D. P. Bertsekas and J. N. Tsitsiklis, "An analysis of stochastic shortest path problems, " Math. Oper. Res., vol. 16, pp. 580-595, August 1991.
-
(1991)
Math. Oper. Res.
, vol.16
, pp. 580-595
-
-
Bertsekas, D.P.1
Tsitsiklis, J.N.2
-
18
-
-
84865144784
-
Automated Verification Techniques for Probabilistic Systems
-
in ser. LNCS, M. Bernardo and V. Issarny, Eds. Springer, to appear
-
V. Forejt, M. Kwiatkowska, G. Norman, and D. Parker, "Automated Verification Techniques for Probabilistic Systems, " in Formal Methods for Eternal Networked Software Systems (SFM'11), ser. LNCS, M. Bernardo and V. Issarny, Eds. Springer, 2011, to appear.
-
(2011)
Formal Methods for Eternal Networked Software Systems (SFM'11)
-
-
Forejt, V.1
Kwiatkowska, M.2
Norman, G.3
Parker, D.4
-
20
-
-
33646909480
-
-
United States
-
M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, The Secure Real-time Transport Protocol (SRTP), United States, 2004.
-
(2004)
The Secure Real-time Transport Protocol (SRTP)
-
-
Baugher, M.1
McGrew, D.2
Naslund, M.3
Carrara, E.4
Norrman, K.5
|