Injecting heterogeneity through protocol randomization (2007)

by Li Zhuang , J. Doug Tygar , Rachna Dhamija , Computer Science Division
Venue:0. We obtain Ui = M − c . Because c− bc � � pL = bc b − pL
Citations:2 - 0 self

Active Bibliography

490 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
792 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
540 DART: Directed automated random testing – Patrice Godefroid, Nils Klarlund, Koushik Sen - 2005
501 Pervasive Computing: Vision and Challenges – M. Satyanarayanan - 2001
1360 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
1156 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
1066 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
616 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
506 Cryptography and Data Security – Dorothy E. Denning, Peter, J. Denning - 1982