1
Published 2007
Table of Contents: ... -- Modular Shape Analysis for Dynamically Encapsulated Programs -- Static Analysis by Policy Iteration...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment...
View full text
Electronic eBook