Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality setting » functionality testing, functionality securing, functional setting
https functionality » its functionality, bags functionality, cross functionality
program security » program series, process security, program section
setting https » being https, writing https, feeding https
functionality setting » functionality testing, functionality securing, functional setting
https functionality » its functionality, bags functionality, cross functionality
program security » program series, process security, program section
setting https » being https, writing https, feeding https
1
Subjects:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
View full text
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“...Invited Papers -- Rough Sets and Flow Graphs -- A Modal Characterization of Indiscernibility...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Answer Set Programming for Knowledge Representation and Reasoning: Future Directions -- Building a...”View full text
Electronic
eBook
5
Published 2006
Table of Contents:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“... Frameworks -- Regular Talks Theory -- Tableau Calculi for Answer Set Programming -- Declarative Semantics...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... in Answer-Set Programming -- Hybrid Probabilistic Logic Programs with Non-monotonic Negation -- Reducing...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... and Signatures -- Efficient Zero Knowledge on the Internet -- Independent Zero-Knowledge Sets -- An Efficient...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“.... Semantics -- Game Semantics for Call-by-Value Polymorphism -- What Is a Pure Functional? -- Example-Guided...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... Codes -- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms -- Unrestricted...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...”View full text
Electronic
eBook
16
Published 2014
Table of Contents:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“... -- On Bar Recursion and Choice in a Classical Setting -- Proofs, Upside Down: A Functional Correspondence...”View full text
Electronic
eBook
18
Logic for Programming, Artificial Intelligence, and Reasoning 13th International Conference, LPAR...
Published 2006
Table of Contents:
“... Order Functional Programs -- Combining Typing and Size Constraints for Checking the Termination...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... of Imperative Programs by Constraint Solving -- Run-Time Profiling of Functional Logic Programs -- Constructive...”View full text
Electronic
eBook
20
Published 2015
Table of Contents:
“... Functions from Relations in Leon -- Program Analysis and Transformation -- Analyzing array manipulating...”View full text
Electronic
eBook



