Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?
Ita RyanKlaas-Jan StolUtz RoedigPublished in: EnCyCriS@ICSE (2023)
Keyphrases
- coding scheme
- coding method
- lightweight
- security level
- virtual laboratory
- linear prediction
- covert channel
- key agreement protocol
- key exchange
- error control
- cryptographic protocols
- authentication protocol
- standard model
- real time
- security mechanisms
- multi party
- highly efficient
- inter frame
- peer to peer
- feature vectors