提案スペルによる検索:
function computing » education computing, generation computing
program security » program series, process security, program section
https function » its function, sites function, ups function
1
出版事項 2005
目次: ... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...
全文の入手
電子媒体 eBook
2
出版事項 2007
目次: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
全文の入手
電子媒体 eBook
3
出版事項 2006
目次: ... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...
全文の入手
電子媒体 eBook
4
出版事項 2008
目次: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
全文の入手
電子媒体 eBook
5
出版事項 2010
目次: ... for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems...
全文の入手
電子媒体 eBook
6
出版事項 2012
目次: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
全文の入手
電子媒体 eBook
7
著者: Ruan, Xiaoyu., Ruan, Xiaoyu.
出版事項 2014
主題: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
全文の入手
電子媒体 eBook
8
目次: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
全文の入手
電子媒体 eBook
9
著者: Scarioni, Carlo., Scarioni, Carlo.
出版事項 2013
主題: ...Java (Computer program language)....
全文の入手
電子媒体 eBook
10
出版事項 2010
目次: ... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...
全文の入手
電子媒体 eBook
11
出版事項 2010
目次: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
全文の入手
電子媒体 eBook
12
出版事項 2008
目次: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
全文の入手
電子媒体 eBook
13
出版事項 2012
目次: ... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...
全文の入手
電子媒体 eBook
14
出版事項 2007
目次: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
全文の入手
電子媒体 eBook
15
出版事項 2011
主題: ...Programming languages (Electronic computers)....
全文の入手
電子媒体 eBook
16
出版事項 2006
目次: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
全文の入手
電子媒体 eBook
17
出版事項 2005
目次: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
全文の入手
電子媒体 eBook
18
著者: Hazay, Carmit., Hazay, Carmit., Lindell, Yehuda.
出版事項 2010
主題: ...Computer programming....
全文の入手
電子媒体 eBook
19
出版事項 2006
目次: ... Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security...
全文の入手
電子媒体 eBook
20
出版事項 2005
目次: ... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...
全文の入手
電子媒体 eBook