Author of the publication

Planning-Based Security Testing of the SSL/TLS Protocol.

, , , and . ICST Workshops, page 347-355. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Design and Implementation of the In-Parameter-Order Algorithm., and . Math. Comput. Sci., 12 (1): 51-67 (2018)Summary of Locating Hardware Trojans using Combinatorial Testing for Cryptographic Circuits., , and . ICSTW, page 260-262. IEEE, (2023)Summary of Combinatorial Methods for Dynamic Gray-Box SQL Injection Testing., , , and . ICSTW, page 263-265. IEEE, (2023)Combinatorial Methods for HTML Sanitizer Security Testing., , , , and . ICSTW, page 255-259. IEEE, (2023)Developing multithreaded techniques and improved constraint handling for the tool CAgen., , , , and . ICST Workshops, page 87-93. IEEE, (2022)Combinatorial Methods in Security Testing., , , and . Computer, 49 (10): 80-83 (2016)Hadamard Matrices, Designs and Their Secret-Sharing Schemes., , and . CAI, volume 6742 of Lecture Notes in Computer Science, page 216-229. Springer, (2011)Self-dual Codes over Small Prime Fields from Combinatorial Designs., and . CAI, volume 5725 of Lecture Notes in Computer Science, page 278-287. Springer, (2009)Retaining Consistency for Knowledge-Based Security Testing., , , , and . IEA/AIE (2), volume 8482 of Lecture Notes in Computer Science, page 88-97. Springer, (2014)CAGEN: A fast combinatorial test generation tool with support for constraints and higher-index arrays., , , , and . ICST Workshops, page 191-200. IEEE, (2020)