-
4
-
-
40149084776
-
Rule-based static analysis of network protocol implementations
-
Udrea O, Lumezanu C, Foster J S. Rule-based static analysis of network protocol implementations. Information and Computation, 2008, 206(2-4): 130-157.
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 130-157
-
-
Udrea, O.1
Lumezanu, C.2
Foster, J.S.3
-
5
-
-
84901978860
-
Formal verification of security protocol implementations: a survey
-
Avalle M, Pironti A, Sisto R. Formal verification of security protocol implementations: a survey. Formal Aspects of Computing, 2012, 24(12): 1-25.
-
(2012)
Formal Aspects of Computing
, vol.24
, Issue.12
, pp. 1-25
-
-
Avalle, M.1
Pironti, A.2
Sisto, R.3
-
12
-
-
0020204093
-
On testing non-testable programs
-
Weyuker E J. On testing non-testable programs. The Computer Journal. 1982, 25(4): 465-470.
-
(1982)
The Computer Journal.
, vol.25
, Issue.4
, pp. 465-470
-
-
Weyuker, E.J.1
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
16
-
-
34247472119
-
Metamorphic testing and its applications
-
Zhou Z Q, Huang D, Tse T H, Yang Z, Huang H, Chen T Y. Metamorphic testing and its applications. In: Proceedings of the 8th International Symposium on Future Software Technology. 2004, 1-6.
-
(2004)
Proceedings of the 8th International Symposium on Future Software Technology
, pp. 1-6
-
-
Zhou, Z.Q.1
Huang, D.2
Tse, T.H.3
Yang, Z.4
Huang, H.5
Chen, T.Y.6
-
17
-
-
84870268295
-
A metamorphic relation-based approach to testing web services without oracles
-
Sun C A, Wang G, Mu B, Liu H, Wang Z, Chen T Y. A metamorphic relation-based approach to testing web services without oracles. International Journal of Web Services Research, 2012, 9(1): 51-73.
-
(2012)
International Journal of Web Services Research
, vol.9
, Issue.1
, pp. 51-73
-
-
Sun, C.A.1
Wang, G.2
Mu, B.3
Liu, H.4
Wang, Z.5
Chen, T.Y.6
-
18
-
-
63149180343
-
An innovative approach for testing bioinformatics programs using metamorphic testing
-
Chen T Y, Ho J W, Liu H, Xie X. An innovative approach for testing bioinformatics programs using metamorphic testing. BMC Bioinformatics, 2009, 10: 24.
-
(2009)
BMC Bioinformatics
, vol.10
, pp. 24
-
-
Chen, T.Y.1
Ho, J.W.2
Liu, H.3
Xie, X.4
-
20
-
-
84862066626
-
Automated functional testing of online search services
-
Zhou Z Q, Zhang S, Hagenbuchner M, Tse T H, Kuo F C, Chen T Y. Automated functional testing of online search services. Journal of Software Testing, Verification and Reliability, 2012, 22(4): 221-243.
-
(2012)
Journal of Software Testing, Verification and Reliability
, vol.22
, Issue.4
, pp. 221-243
-
-
Zhou, Z.Q.1
Zhang, S.2
Hagenbuchner, M.3
Tse, T.H.4
Kuo, F.C.5
Chen, T.Y.6
-
22
-
-
0017959155
-
Hints on test data selection: help for the practicing programmer
-
DeMillo R, Lipton R J, Sayward F G. Hints on test data selection: help for the practicing programmer. IEEE Computer, 1978, 11(4): 34-41.
-
(1978)
IEEE Computer
, vol.11
, Issue.4
, pp. 34-41
-
-
DeMillo, R.1
Lipton, R.J.2
Sayward, F.G.3
-
23
-
-
84870831442
-
Distribution-aware mutation analysis
-
Sun C A, Wang G, Cai K Y, Chen T Y. Distribution-aware mutation analysis. In: Proceedings of the 9th International Workshop on Software Cybernetics, in conjunction with the 36th IEEE International Computer Software and Application Conference. 2012, 170-175.
-
(2012)
Proceedings of the 9th International Workshop on Software Cybernetics, in Conjunction with the 36th IEEE International Computer Software and Application Conference
, pp. 170-175
-
-
Sun, C.A.1
Wang, G.2
Cai, K.Y.3
Chen, T.Y.4
-
30
-
-
84902006942
-
Teaching the RSA algorithm using spreadsheets
-
H. B. Zeng. Teaching the RSA algorithm using spreadsheets. Journal of Computing Sciences in Colleges, 2012, 28(1): 18-24.
-
(2012)
Journal of Computing Sciences in Colleges
, vol.28
, Issue.1
, pp. 18-24
-
-
Zeng, H.B.1
-
32
-
-
77949293287
-
Cryptosystem and its application to image encryption
-
Acharya B, Shukla S K, Panigrahy S K, Patra S K, Panda G. Cryptosystem and its application to image encryption. In: Proceedings of the 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies. 2009, 720-724.
-
(2009)
Proceedings of the 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
, pp. 720-724
-
-
Acharya, B.1
Shukla, S.K.2
Panigrahy, S.K.3
Patra, S.K.4
Panda, G.5
-
35
-
-
84901986416
-
A test method of sequence randomness of information security system
-
Su G, Liu Z C, Yao X C, Yin X W. A test method of sequence randomness of information security system. Chinese Journal of Computer Engineering, 2006, 32(8): 153-154.
-
(2006)
Chinese Journal of Computer Engineering
, vol.32
, Issue.8
, pp. 153-154
-
-
Su, G.1
Liu, Z.C.2
Yao, X.C.3
Yin, X.W.4
-
36
-
-
79951993341
-
Research and Implementation of Randomness Tests
-
Shi G D, Kang F, Gu H W. Research and Implementation of Randomness Tests. Chinese Journal of Computer Engineering, 2009, 35(20): 145-150.
-
(2009)
Chinese Journal of Computer Engineering
, vol.35
, Issue.20
, pp. 145-150
-
-
Shi, G.D.1
Kang, F.2
Gu, H.W.3
-
38
-
-
0003822632
-
-
Rukhin A, Soto J, Nechvatal J, Smin M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical Report of National Institute of Standards and Technology. 2001.
-
(2001)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smin, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
39
-
-
80355142019
-
On the randomness test and its incompleteness
-
Zhang B, Yang Y S, Gao J P. On the randomness test and its incompleteness. Journal of Tsinghua University (Science and Technology), 2011, 51(10): 1269-1273.
-
(2011)
Journal of Tsinghua University (Science and Technology)
, vol.51
, Issue.10
, pp. 1269-1273
-
-
Zhang, B.1
Yang, Y.S.2
Gao, J.P.3
-
42
-
-
84942246406
-
Automatic validation of protocol narration
-
Bodei C, Buchholtz M, Degano, Nielson F, Nielson H R. Automatic validation of protocol narration. In: Proceedings of the 16th IEEE Workshop on Computer Security Foundations. 2003, 126-140.
-
(2003)
Proceedings of the 16th IEEE Workshop on Computer Security Foundations
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano3
Nielson, F.4
Nielson, H.R.5
-
43
-
-
57849126802
-
Verified interoperable implementations of security protocols
-
Bhargavan K, Fournet C, Gordon A D, Tse S. Verified interoperable implementations of security protocols. ACM Transactions on Programming Languages and Systems, 2008, 31(1): 1-61.
-
(2008)
ACM Transactions on Programming Languages and Systems
, vol.31
, Issue.1
, pp. 1-61
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
46
-
-
0037542974
-
A parity code based fault detection for an implementation of the advanced encryption standard
-
Bertoni G, Breveglieri L, Koren I, Maistri P, Piuri V. A parity code based fault detection for an implementation of the advanced encryption standard. In: Proceedings of the 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems. 2002, 51-59.
-
(2002)
Proceedings of the 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems
, pp. 51-59
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Maistri, P.4
Piuri, V.5
-
48
-
-
70350523582
-
Fault detection structures of the S-boxes and the inverse S-boxes for the advanced encryption standard
-
Mozaffari-Kermani M, Reyhani-Masoleh A. Fault detection structures of the S-boxes and the inverse S-boxes for the advanced encryption standard. Journal of Electronic Testing, 2009, 25(4-5): 225-245.
-
(2009)
Journal of Electronic Testing
, vol.25
, Issue.4-5
, pp. 225-245
-
-
Mozaffari-Kermani, M.1
Reyhani-Masoleh, A.2
-
50
-
-
18744388583
-
Testing context sensitive middleware-based software applications
-
Tse T H, Yau S S, Chan W K, Lu H, Chen T Y. Testing context sensitive middleware-based software applications. In: Proceedings of the 28th Annual International Computer Software and Applications Conference. 2004, 458-466.
-
(2004)
Proceedings of the 28th Annual International Computer Software and Applications Conference
, pp. 458-466
-
-
Tse, T.H.1
Yau, S.S.2
Chan, W.K.3
Lu, H.4
Chen, T.Y.5
|