메뉴 건너뛰기




Volumn , Issue , 2013, Pages 461-468

Formal models of bank cards for free

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC INFERENCE; BLACK BOXES; DESIGN AND IMPLEMENTATIONS; FINITE STATE MACHINE MODEL; FORMAL MODEL; LEARNING TECHNIQUES; SECURITY EVALUATION; SMART-CARD APPLICATION;

EID: 84883323315     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSTW.2013.60     Document Type: Conference Paper
Times cited : (77)

References (20)
  • 2
    • 0023453626 scopus 로고
    • Learning regular sets from queries and counterexamples
    • D. Angluin, "Learning regular sets from queries and counterexamples, " Inf. Comput. , vol. 75, no. 2, pp. 87-106, 1987.
    • (1987) Inf. Comput. , vol.75 , Issue.2 , pp. 87-106
    • Angluin, D.1
  • 11
    • 0017973244 scopus 로고
    • Testing software design modeled by finite-state machines
    • special issue on COMPSAC
    • T. Chow, "Testing software design modeled by finite-state machines, " Software Engineering, IEEE Transactions on, vol. 4, no. 3, pp. 178-187, 1978, special issue on COMPSAC.
    • (1978) Software Engineering, IEEE Transactions on , vol.4 , Issue.3 , pp. 178-187
    • Chow, T.1
  • 14
    • 57049146951 scopus 로고    scopus 로고
    • Model-based security testing using UMLsec:: A case study
    • J. Jürjens, "Model-based security testing using UMLsec:: A case study, " Electronic Notes in Theoretical Computer Science, vol. 220, no. 1, pp. 93-104, 2008.
    • (2008) Electronic Notes in Theoretical Computer Science , vol.220 , Issue.1 , pp. 93-104
    • Jürjens, J.1
  • 19
    • 67249125809 scopus 로고    scopus 로고
    • A model-based approach to security flaw detection of network protocol implementations
    • Y. Hsu, G. Shu, and D. Lee, "A model-based approach to security flaw detection of network protocol implementations, " 2008 IEEE International Conference on Network Protocols, vol. 40, no. 2, pp. 114-123, 2008.
    • (2008) 2008 IEEE International Conference on Network Protocols , vol.40 , Issue.2 , pp. 114-123
    • Hsu, Y.1    Shu, G.2    Lee, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.