Search alternatives:
program security » program series, process security, program section
function control » functions control, junction control, functional control
https function » its function, sites function, ups function
1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Published 2012
Table of Contents: ...: Types for Capabilities -- Types and Access Controls for Cross-Domain Security in Flash -- Linear...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... Programs -- The Case for Nuclear Energy -- Nuclear Safety and Energy Security -- Nuclear Energy and Social...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Data Flow...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... -- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
View full text
Electronic eBook
10
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
11
Published 2006
Table of Contents: ... Control -- Securing Information Gateways with Derivation-Constrained Access Control -- Information Flow...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ...) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... -- Controlling Spam by Secure Internet Content Selection -- Key Distribution and Feedback Shift Registers...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... and Practice -- Session 1A. Access Control -- Rewriting of SPARQL/Update Queries for Securing Data Access...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook