Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
program functionality » protein functionality, programs functional, supra functionality
processing security » processing series
functionality using » functionality business, functionality design, functioning using
security program » security problems, security proofs, security proof
using https » using http, nursing https, aging https
program functionality » protein functionality, programs functional, supra functionality
processing security » processing series
functionality using » functionality business, functionality design, functioning using
security program » security problems, security proofs, security proof
using https » using http, nursing https, aging https
1
Published 2008
Table of Contents:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“...) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... of Interdependent Functions in Automotive Vehicles Using EAST-ADL2 -- Experiences in Applying Formal Verification...”View full text
Electronic
eBook
9
Published 2012
Table of Contents:
“... and Value Faults -- An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...”View full text
Electronic
eBook
11
Published 2012
Table of Contents:
“... of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“...Invited Talks -- Why Use Datalog to Analyze Programs? -- Semantic Web: The Story of the RIFt so Far...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“...: Mapping Solver Independent Models to Efficient Solutions -- Use of Logic Programming for Complex Business...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements -- Robust Multicast...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“...-Free Grammars Using an Incremental SAT Solver -- Track C: Security and Cryptography Foundations -- Weak...”View full text
Electronic
eBook
18
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... Processes -- A Dolev-Yao-Based Definition of Abuse-Free Protocols -- Secrecy and Protocol Analysis...”View full text
Electronic
eBook
20
Programming Languages and Systems 16th European Symposium on Programming, ESOP 2007, Held as Part...
Published 2007
Table of Contents:
“... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...”View full text
Electronic
eBook



