1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Published 2012
Table of Contents: ... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...
View full text
Electronic eBook
3
Published 2011
Subjects: ...Programming Languages, Compilers, Interpreters. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...
View full text
Electronic eBook
8
Published 2012
Subjects: ...Logics and Meanings of Programs. https://scigraph.springernature.com/ontologies/product-market...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Verification for Higher-Order Functional Programs -- An Abstract Domain to Infer Ordinal-Valued Ranking...
View full text
Electronic eBook
11
Published 2012
Table of Contents: ... -- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing -- The Generalized...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... -- Identification of Security Requirements in Systems of Systems by Functional Security Analysis -- Implementing...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ... Parametric Behaviour Models -- Extra-Functional Properties: Security and Energy -- Validating Access Control...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Completeness for Proof-Terms with Laird’s Dual Affine/Intuitionistic ?-Calculus -- Linear Recursive Functions...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ..., and Neither Are Testers -- Contract-Based Reasoning for Verification and Certification of Secure Information...
View full text
Electronic eBook
16
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
17
by Townsend, RJ., Townsend, RJ.
Published 2010
Table of Contents: ... to Drupal Functionality....
View full text
Electronic eBook
18
Published 2015
Table of Contents: ...: Analysis and Applications -- Linear Secret Sharing Schemes from Error Correcting Codes -- Function Secret...
View full text
Electronic eBook
19
Published 2015
Table of Contents: ... with Security for Malicious Adversaries -- How to Efficiently Evaluate RAM Programs with Malicious Security...
View full text
Electronic eBook
20
Published 2013
Table of Contents: ... Functional Programs -- Tool Demonstrations Polyglot: Systematic Analysis for Multiple Statechart Formalisms...
View full text
Electronic eBook