Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
functional security » functions security, function security, national security
program function » programme function, programs functional, program foundation
https functional » cots functional, cuts functional, dots functional
function https » functions https, fiction https
functional security » functions security, function security, national security
program function » programme function, programs functional, program foundation
https functional » cots functional, cuts functional, dots functional
function https » functions https, fiction https
1
Soggetti:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
Testo
Testo
Elettronico
eBook
2
di Debbabi, Mourad., Debbabi, Mourad., Saleh, Mohamed., Talhi, Chamseddine., Zhioua, Sami.
Pubblicazione 2007
Sommario:
“... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...”Pubblicazione 2007
Testo
Elettronico
eBook
3
Pubblicazione 2008
Sommario:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”Testo
Elettronico
eBook
4
Pubblicazione 2010
Sommario:
“... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...”Testo
Elettronico
eBook
5
Pubblicazione 2010
Sommario:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”Testo
Elettronico
eBook
6
Pubblicazione 2012
Sommario:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”Testo
Elettronico
eBook
7
Pubblicazione 2011
Soggetti:
“...Programming Languages, Compilers, Interpreters. https://scigraph.springernature.com/ontologies...”Testo
Elettronico
eBook
8
Soggetti:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
Testo
Testo
Elettronico
eBook
9
Pubblicazione 2007
Sommario:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”Testo
Elettronico
eBook
10
Pubblicazione 2005
Sommario:
“... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...”Testo
Elettronico
eBook
11
Pubblicazione 2007
Sommario:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”Testo
Elettronico
eBook
12
Pubblicazione 2008
Sommario:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”Testo
Elettronico
eBook
13
Soggetti:
“...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...”
Testo
Testo
Elettronico
eBook
14
Pubblicazione 2010
Sommario:
“... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...”Testo
Elettronico
eBook
15
Pubblicazione 2012
Sommario:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”Testo
Elettronico
eBook
16
Pubblicazione 2005
Sommario:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”Testo
Elettronico
eBook
17
Pubblicazione 2006
Sommario:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”Testo
Elettronico
eBook
18
Soggetti:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
Testo
Testo
Elettronico
eBook
19
Pubblicazione 2006
Sommario:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”Testo
Elettronico
eBook
20
Pubblicazione 2005
Sommario:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”Testo
Elettronico
eBook



