1
Published 2015
Table of Contents: ...-Order Functional Intermediate Language for Verified Compilers -- Autosubst: Reasoning with de Bruijn...
View full text
Electronic eBook
2
Published 2012
Table of Contents: ... Tactics Using OpenTheory -- Functional Programs: Conversions between Deep and Shallow Embeddings....
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... Programs Extraction -- Experience Implementing a Performant Category-Theory Library in Coq -- A New...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...
View full text
Electronic eBook
9
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... Declarative Theorem Prover for First-Order Classical Logic -- Towards Ludics Programming: Interactive Proof...
View full text
Electronic eBook
11
Published 2006
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ...-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...
View full text
Electronic eBook