Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
program interactive » programmed interactive, programs integrative, programs interaction
https functionality » its functionality, bags functionality, cross functionality
interactive https » interaction https, interactions https, interactive hip
functionality security » functionality securing, functional security, functionality usability
program interactive » programmed interactive, programs integrative, programs interaction
https functionality » its functionality, bags functionality, cross functionality
interactive https » interaction https, interactions https, interactive hip
1
Published 2015
Table of Contents:
“...-Order Functional Intermediate Language for Verified Compilers -- Autosubst: Reasoning with de Bruijn...”View full text
Electronic
eBook
2
Published 2012
Table of Contents:
“... Tactics Using OpenTheory -- Functional Programs: Conversions between Deep and Shallow Embeddings....”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... Programs Extraction -- Experience Implementing a Performant Category-Theory Library in Coq -- A New...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
5
Published 2006
Table of Contents:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... Declarative Theorem Prover for First-Order Classical Logic -- Towards Ludics Programming: Interactive Proof...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”View full text
Electronic
eBook
12
Published 2005
Table of Contents:
“... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“...-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...”View full text
Electronic
eBook



