Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
program security » program series, process security, program section
https function » its function, sites function, ups function
based https » based http
program security » program series, process security, program section
https function » its function, sites function, ups function
based https » based http
1
Subjects:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
View full text
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... of Imperative Programs by Constraint Solving -- Run-Time Profiling of Functional Logic Programs -- Constructive...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Strategies -- A Program Transformation for Tracing Functional Logic Computations -- Termination and Analysis...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... of Logic Programs Based on Dependency Graphs -- Type-Based Homeomorphic Embedding and Its Applications...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“...Semantics of Logic Languages -- Ecient compilation of functional logic programs -- Types...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... Functions from Relations in Leon -- Program Analysis and Transformation -- Analyzing array manipulating...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“...CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... Parametric Behaviour Models -- Extra-Functional Properties: Security and Energy -- Validating Access Control...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook
17
Published 2012
Table of Contents:
“... Environments -- Program Comprehension in Preprocessor-Based Software....”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... -- Deriving Safety Cases for Hierarchical Structure in Model-Based Development -- Assurance of Automotive...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“... -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving...”View full text
Electronic
eBook



