ACM Transactions on Computer Systems (TOCS)
Digital logic circuit analysis and design
Digital logic circuit analysis and design
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
On Communicating Finite-State Machines
Journal of the ACM (JACM)
Using encryption for authentication in large networks of computers
Communications of the ACM
Formal Verification of Cryptographic Protocols: A Survey
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Automated verification of temporal properties specified as state machines in VHDL
GLSVLSI '95 Proceedings of the Fifth Great Lakes Symposium on VLSI (GLSVLSI'95)
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Simulation of Security Protocols based on Scenarios of Attacks
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P)
Simulation of Security Protocols based on Scenarios of Attacks
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P)
Hi-index | 0.00 |
In this article we define metrics for measuring component interface similarity. These metrics were applied in an empirical study investigating the relationship between the functionality and the interfaces of software components. The main contributions ...