1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ...) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... of Interdependent Functions in Automotive Vehicles Using EAST-ADL2 -- Experiences in Applying Formal Verification...
View full text
Electronic eBook
9
Published 2012
Table of Contents: ... and Value Faults --  An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...
View full text
Electronic eBook
11
Published 2012
Table of Contents: ... of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ...Invited Talks -- Why Use Datalog to Analyze Programs? -- Semantic Web: The Story of the RIFt so Far...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ...: Mapping Solver Independent Models to Efficient Solutions -- Use of Logic Programming for Complex Business...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements -- Robust Multicast...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ...-Free Grammars Using an Incremental SAT Solver -- Track C: Security and Cryptography Foundations -- Weak...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... Processes -- A Dolev-Yao-Based Definition of Abuse-Free Protocols -- Secrecy and Protocol Analysis...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...
View full text
Electronic eBook