ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Lazy Self-composition for Security Verification
Computer Aided Verification - Lecture Notes in Computer Science
◽
10.1007/978-3-319-96142-2_11
◽
2018
◽
pp. 136-156
◽
Cited By ~ 4
Author(s):
Weikun Yang
◽
Yakir Vizel
◽
Pramod Subramanyan
◽
Aarti Gupta
◽
Sharad Malik
Keyword(s):
Security Verification
Download Full-text
Related Documents
Cited By
References
Security Verification in Web Browser Extensions
SSRN Electronic Journal
◽
10.2139/ssrn.3168418
◽
2018
◽
Cited By ~ 1
Author(s):
Chinmay Agarwal
◽
Medhavini Kulshrestha
◽
Himanshu Rathore
◽
Kamalakannan J
Keyword(s):
Web Browser
◽
Security Verification
◽
Browser Extensions
Download Full-text
Runtime Security Verification for Itinerary-Driven Mobile Agents
2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
◽
10.1109/dasc.2006.42
◽
2006
◽
Cited By ~ 3
Author(s):
Zijiang Yang
◽
Shiyong Lu
◽
Ping Yang
Keyword(s):
Mobile Agents
◽
Security Verification
Download Full-text
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
10.1109/icact.2005.246179
◽
2005
◽
Author(s):
Youngsoo Kim
◽
Tackyong Nam
Keyword(s):
Digital Signatures
◽
High Security
◽
Security Verification
Download Full-text
Property Based Formal Security Verification for Hardware Trojan Detection
2018 IEEE 3rd International Verification and Security Workshop (IVSW)
◽
10.1109/ivsw.2018.8494858
◽
2018
◽
Author(s):
Maoyuan Qin
◽
Wei Hu
◽
Dejun Mu
◽
Yu Tai
Keyword(s):
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Security Verification
Download Full-text
Learning to Produce Direct Tests for Security Verification Using Constrained Process Discovery
Proceedings of the 54th Annual Design Automation Conference 2017 on - DAC '17
◽
10.1145/3061639.3062271
◽
2017
◽
Cited By ~ 1
Author(s):
Kuo-Kai Hsieh
◽
Li-C. Wang
◽
Wen Chen
◽
Jayanta Bhadra
Keyword(s):
Process Discovery
◽
Security Verification
Download Full-text
Toward the Ontology-Based Security Verification and Validation Model for the Vehicular Domain
Communications in Computer and Information Science - Neural Information Processing
◽
10.1007/978-3-030-36808-1_57
◽
2019
◽
pp. 521-529
Author(s):
Abdelkader Magdy Shaaban
◽
Christoph Schmittner
◽
Gerald Quirchmayr
◽
A. Baith Mohamed
◽
Thomas Gruber
◽
...
Keyword(s):
Verification And Validation
◽
Security Verification
Download Full-text
Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS
10.5220/0010580900002998
◽
2021
◽
Author(s):
Nils Mäurer
◽
Christoph Gentsch
◽
Thomas Gräupl
◽
Corinna Schmitt
Keyword(s):
Cell Attachment
◽
Security Verification
Download Full-text
Security Verification of a Communication Authentication Protocol in Vehicular Security System
Journal of Digital Convergence
◽
10.14400/jdc.2014.12.8.229
◽
2014
◽
Vol 12
(8)
◽
pp. 229-234
Author(s):
Myoungseok Han
◽
WooSik Bae
Keyword(s):
Authentication Protocol
◽
Security System
◽
Security Verification
Download Full-text
A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream
Lecture Notes in Computer Science - Web Information Systems Engineering – WISE 2015
◽
10.1007/978-3-319-26187-4_7
◽
2015
◽
pp. 93-108
◽
Cited By ~ 19
Author(s):
Deepak Puthal
◽
Surya Nepal
◽
Rajiv Ranjan
◽
Jinjun Chen
Keyword(s):
Real Time
◽
Data Stream
◽
Sensing Data
◽
Key Length
◽
Dynamic Key
◽
Security Verification
Download Full-text
Proposal of HILS-Based In-Vehicle Network Security Verification Environment
10.4271/2018-01-0013
◽
2018
◽
Cited By ~ 3
Author(s):
Ryo Kurachi
◽
Toshiyuki Fujikura
Keyword(s):
Network Security
◽
Vehicle Network
◽
Security Verification
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close