Pub Date : 2020-10-13DOI: 10.1007/978-3-030-64357-7_6
Martin R. Albrecht, R. Jensen
{"title":"The Vacuity of the Open Source Security Testing Methodology Manual","authors":"Martin R. Albrecht, R. Jensen","doi":"10.1007/978-3-030-64357-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-64357-7_6","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-26DOI: 10.1007/978-3-030-04762-7_9
J. Kelsey
{"title":"The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party","authors":"J. Kelsey","doi":"10.1007/978-3-030-04762-7_9","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_9","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126743553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-26DOI: 10.1007/978-3-030-04762-7_3
K. Teichel, Gregor Hildermeier
{"title":"Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization Protocols","authors":"K. Teichel, Gregor Hildermeier","doi":"10.1007/978-3-030-04762-7_3","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_3","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133882400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-26DOI: 10.1007/978-3-030-04762-7_8
D. Hurley-Smith, J. Hernandez-Castro
{"title":"Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification","authors":"D. Hurley-Smith, J. Hernandez-Castro","doi":"10.1007/978-3-030-04762-7_8","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_8","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115807268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-26DOI: 10.1007/978-3-030-04762-7_5
M. Balduccini, C. Vishik
{"title":"Building Blocks in Standards: Improving Consistency in Standardization with Ontology and Reasoning","authors":"M. Balduccini, C. Vishik","doi":"10.1007/978-3-030-04762-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_5","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115087545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-06DOI: 10.1007/978-3-030-04762-7_6
Mohsin Khan, Philip Ginzboorg, K. Järvinen, Valtteri Niemi
{"title":"Defeating the Downgrade Attack on Identity Privacy in 5G","authors":"Mohsin Khan, Philip Ginzboorg, K. Järvinen, Valtteri Niemi","doi":"10.1007/978-3-030-04762-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-04762-7_6","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-05DOI: 10.1007/978-3-319-49100-4_5
Kelsey Cairns, H. Halpin, G. Steel
{"title":"Security Analysis of the W3C Web Cryptography API","authors":"Kelsey Cairns, H. Halpin, G. Steel","doi":"10.1007/978-3-319-49100-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_5","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}