Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
program security » program series, process security, program section
function control » functions control, junction control, functional control
https function » its function, sites function, ups function
program security » program series, process security, program section
function control » functions control, junction control, functional control
https function » its function, sites function, ups function
1
Published 2008
Table of Contents:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”View full text
Electronic
eBook
2
Published 2012
Table of Contents:
“...: Types for Capabilities -- Types and Access Controls for Cross-Domain Security in Flash -- Linear...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Programs -- The Case for Nuclear Energy -- Nuclear Safety and Energy Security -- Nuclear Energy and Social...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Data Flow...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... -- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“... Control -- Securing Information Gateways with Derivation-Constrained Access Control -- Information Flow...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“...) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... -- Controlling Spam by Secure Internet Content Selection -- Key Distribution and Feedback Shift Registers...”View full text
Electronic
eBook
15
Published 2006
Table of Contents:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... and Practice -- Session 1A. Access Control -- Rewriting of SPARQL/Update Queries for Securing Data Access...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook



