Model based security verification of protocol implementation (English)
- New search for: Fu, Yulong
- Further information on Fu, Yulong:
-
https://orcid.org/0000-0002-6631-9124
- New search for: Koné, Ousmane
- New search for: Fu, Yulong
- New search for: Koné, Ousmane
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Model based security verification of protocol implementation
-
Contributors:Fu, Yulong ( author ) / Koné, Ousmane ( author )
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2014-01-01
-
Size:11 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 22
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Editorial: Special issue on security of information and networksElçi, Atilla / Orgun, Mehmet A. / Chefranov, Alexander / Gaur, Manoj Singh et al. | 2015
- 3
-
Effectiveness of qualitative and quantitative security obligationsPieters, W. / Padget, J. / Dechesne, F. / Dignum, V. / Aldewereld, H. et al. | 2014
- 17
-
Model based security verification of protocol implementationFu, Yulong / Koné, Ousmane et al. | 2014
- 28
-
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergiesAslam, Mudassar / Gehrmann, Christian / Björkman, Mats et al. | 2014
- 40
-
Blinded additively homomorphic encryption schemes for self-tallying votingDossogne, Jérôme / Lafitte, Frédéric et al. | 2014
- 54
-
SAT based analysis of LTE stream cipher ZUCLafitte, Frédéric / Markowitch, Olivier / Van Heule, Dirk et al. | 2014
- 66
-
AndroSimilar: Robust signature for detecting variants of Android malwareFaruki, Parvez / Laxmi, Vijay / Bharmal, Ammar / Gaur, M.S. / Ganmoor, Vijay et al. | 2014
- 81
-
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VMAnikeev, Maxim / Freiling, Felix C. / Götzfried, Johannes / Müller, Tilo et al. | 2014
- 87
-
Anonymous group-based routing in MANETsTaheri, Somayeh / Hartung, Salke / Hogrefe, Dieter et al. | 2014
- 99
-
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANETLaxmi, Vijay / Lal, Chhagan / Gaur, M.S. / Mehta, Deepanshu et al. | 2014
- 113
-
Advanced social engineering attacksKrombholz, Katharina / Hobel, Heidelinde / Huber, Markus / Weippl, Edgar et al. | 2014