Works Published in 2006

search works

Displaying all 8 works

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2006 article proceedings

TARP: Ticket-based Address Resolution Protocol

Presented at the 21st Annual Computer Security Applications Conference (ACSAC'05).

By: W. Lootah*, W. Enck* & P. McDaniel*

Event: 21st Annual Computer Security Applications Conference (ACSAC'05)

Sources: Crossref, NC State University Libraries
Added: January 7, 2024

2006 conference paper

Mitigating attacks on open functionality in SMS-capable cellular networks

Proceedings of the 12th annual international conference on Mobile computing and networking, 182–193.

By: P. Traynor, W. Enck, P. McDaniel & T. La Porta

Event: ACM

Source: ORCID
Added: January 2, 2024

2006 thesis

Analysis of Open Functionality in SMS-capable Cellular Networks

Pennsylvania State University.

By: W. Enck

Source: ORCID
Added: January 2, 2024

2006 chapter

Privacy Preserving Web-Based Email

In Information Systems Security (pp. 116–131).

Event: Springer Berlin Heidelberg

TL;DR: This paper creates virtual channels over online services (e.g., Google's Gmail, Microsoft's Hotmail) through which messages and cryptographic keys are delivered and creates a wired “spread-spectrum” mechanism for protecting the privacy of web-based communication. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries, ORCID
Added: August 28, 2020

2006 chapter

Password Exhaustion: Predicting the End of Password Usefulness

In Information Systems Security (pp. 37–55).

By: L. Clair*, L. Johansen*, W. Enck*, M. Pirretti*, P. Traynor*, P. McDaniel*, T. Jaeger*

TL;DR: An analytical model for computation is developed to understand the time required to recover random passwords and concludes that past systems vulnerable to offline attacks will be obsolete in 5-15 years and a large number of these systems are already obsolete. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries, ORCID
Added: August 28, 2020

2006 article

Motivations and measurements in an agile case study

Layman, L., Williams, L., & Cunningham, L. (2006, November). JOURNAL OF SYSTEMS ARCHITECTURE, Vol. 52, pp. 654–667.

By: L. Layman n, L. Williams n & L. Cunningham*

author keywords: software engineering; case study; agile software development; extreme programming
Source: Web Of Science
Added: August 6, 2018

2006 journal article

On the value of static analysis for fault detection in software

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 32(4), 240–253.

By: J. Zheng n, L. Williams n, N. Nagappan*, W. Snipes, J. Hudepohl & M. Vouk n

author keywords: code inspections; walkthroughs
Source: Web Of Science
Added: August 6, 2018

2006 journal article

Essential communication practices for Extreme Programming in a global software development team

INFORMATION AND SOFTWARE TECHNOLOGY, 48(9), 781–794.

author keywords: global software development; Extreme Programming; case study
TL;DR: An industrial case study of a distributed team in the USA and the Czech Republic that used Extreme Programming suggests that, if critical enabling factors are addressed, methodologies dependent on informal communication can be used on global software development projects. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.