Search alternatives:
program security » program series, process security, program section
https function » its function, sites function, ups function
based https » based http
1
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... of Imperative Programs by Constraint Solving -- Run-Time Profiling of Functional Logic Programs -- Constructive...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Strategies -- A Program Transformation for Tracing Functional Logic Computations -- Termination and Analysis...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... of Logic Programs Based on Dependency Graphs -- Type-Based Homeomorphic Embedding and Its Applications...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ...Semantics of Logic Languages -- Ecient compilation of functional logic programs -- Types...
View full text
Electronic eBook
6
Published 2015
Table of Contents: ... Functions from Relations in Leon -- Program Analysis and Transformation -- Analyzing array manipulating...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ...CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... Parametric Behaviour Models -- Extra-Functional Properties: Security and Energy -- Validating Access Control...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook
17
Published 2012
Table of Contents: ... Environments -- Program Comprehension in Preprocessor-Based Software....
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... -- Deriving Safety Cases for Hierarchical Structure in Model-Based Development -- Assurance of Automotive...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ... -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving...
View full text
Electronic eBook