Author of the publication

Planning-Based Security Testing of the SSL/TLS Protocol.

, , , and . ICST Workshops, page 347-355. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach., , , , and . QRS, page 69-73. IEEE, (2016)Coveringcerts: Combinatorial Methods for X.509 Certificate Testing., and . ICST, page 69-79. IEEE Computer Society, (2017)Evaluation of Tie-Breaking and Parameter Ordering for the IPO Family of Algorithms Used in Covering Array Generation., , and . IWOCA, volume 10979 of Lecture Notes in Computer Science, page 189-200. Springer, (2018)CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets., , and . ICST Workshops, page 318-327. IEEE Computer Society, (2018)An Efficient Design and Implementation of the In-Parameter-Order Algorithm., and . Math. Comput. Sci., 12 (1): 51-67 (2018)CAGEN: A fast combinatorial test generation tool with support for constraints and higher-index arrays., , , , and . ICST Workshops, page 191-200. IEEE, (2020)Planning-Based Security Testing of the SSL/TLS Protocol., , , and . ICST Workshops, page 347-355. IEEE Computer Society, (2017)Testing TLS using planning-based combinatorial methods and execution framework., , , , , , , and . Softw. Qual. J., 27 (2): 703-729 (2019)Algorithmic methods for covering arrays of higher index., , , , and . J. Comb. Optim., 45 (1): 28 (2023)