ACM SIGSOFT Symposium on Software Reusability最新文献

筛选
英文 中文
The Vacuity of the Open Source Security Testing Methodology Manual 开源安全测试方法手册的空白
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2020-10-13 DOI: 10.1007/978-3-030-64357-7_6
Martin R. Albrecht, R. Jensen
{"title":"The Vacuity of the Open Source Security Testing Methodology Manual","authors":"Martin R. Albrecht, R. Jensen","doi":"10.1007/978-3-030-64357-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-64357-7_6","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
hacspec: Towards Verifiable Crypto Standards hacspec:迈向可验证的加密标准
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-26 DOI: 10.1007/978-3-030-04762-7_1
K. Bhargavan, Franziskus Kiefer, Pierre-Yves Strub
{"title":"hacspec: Towards Verifiable Crypto Standards","authors":"K. Bhargavan, Franziskus Kiefer, Pierre-Yves Strub","doi":"10.1007/978-3-030-04762-7_1","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_1","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC) COSE (EDHOC)上瞬时Diffie-Hellman的形式化验证
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-26 DOI: 10.1007/978-3-030-04762-7_2
A. Bruni, Thorvald Sahl Jørgensen, Theis Grønbech Petersen, C. Schürmann
{"title":"Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC)","authors":"A. Bruni, Thorvald Sahl Jørgensen, Theis Grønbech Petersen, C. Schürmann","doi":"10.1007/978-3-030-04762-7_2","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_2","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133976329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party 新的随机信标格式标准:限制可信第三方权力的实践
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-26 DOI: 10.1007/978-3-030-04762-7_9
J. Kelsey
{"title":"The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party","authors":"J. Kelsey","doi":"10.1007/978-3-030-04762-7_9","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_9","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126743553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization Protocols 对tesla安全时间同步协议攻击的实验评估
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-26 DOI: 10.1007/978-3-030-04762-7_3
K. Teichel, Gregor Hildermeier
{"title":"Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization Protocols","authors":"K. Teichel, Gregor Hildermeier","doi":"10.1007/978-3-030-04762-7_3","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_3","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133882400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols 协调加强私隐安全通讯协议的开发人员和高风险用户
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-26 DOI: 10.1007/978-3-030-04762-7_4
H. Halpin, Ksenia Ermoshina, F. Musiani
{"title":"Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols","authors":"H. Halpin, Ksenia Ermoshina, F. Musiani","doi":"10.1007/978-3-030-04762-7_4","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_4","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116653363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification 伟大的期望:对随机数生成测试和认证的当前方法的批评
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-26 DOI: 10.1007/978-3-030-04762-7_8
D. Hurley-Smith, J. Hernandez-Castro
{"title":"Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification","authors":"D. Hurley-Smith, J. Hernandez-Castro","doi":"10.1007/978-3-030-04762-7_8","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_8","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115807268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Building Blocks in Standards: Improving Consistency in Standardization with Ontology and Reasoning 标准中的积木:用本体和推理提高标准化的一致性
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-26 DOI: 10.1007/978-3-030-04762-7_5
M. Balduccini, C. Vishik
{"title":"Building Blocks in Standards: Improving Consistency in Standardization with Ontology and Reasoning","authors":"M. Balduccini, C. Vishik","doi":"10.1007/978-3-030-04762-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_5","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115087545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defeating the Downgrade Attack on Identity Privacy in 5G 战胜5G身份隐私降级攻击
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2018-11-06 DOI: 10.1007/978-3-030-04762-7_6
Mohsin Khan, Philip Ginzboorg, K. Järvinen, Valtteri Niemi
{"title":"Defeating the Downgrade Attack on Identity Privacy in 5G","authors":"Mohsin Khan, Philip Ginzboorg, K. Järvinen, Valtteri Niemi","doi":"10.1007/978-3-030-04762-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_6","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Security Analysis of the W3C Web Cryptography API W3C Web加密API的安全性分析
ACM SIGSOFT Symposium on Software Reusability Pub Date : 2016-12-05 DOI: 10.1007/978-3-319-49100-4_5
Kelsey Cairns, H. Halpin, G. Steel
{"title":"Security Analysis of the W3C Web Cryptography API","authors":"Kelsey Cairns, H. Halpin, G. Steel","doi":"10.1007/978-3-319-49100-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_5","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书