Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality testing » functionality setting, functional testing, functionality using
https functionality » its functionality, bags functionality, cross functionality
program security » program series, process security, program section
testing https » teaching https, being https, writing https
functionality testing » functionality setting, functional testing, functionality using
https functionality » its functionality, bags functionality, cross functionality
program security » program series, process security, program section
testing https » teaching https, being https, writing https
1
Published 2015
Table of Contents:
“... Suites -- Case Study: Automatic test case generation for a secure cache Implementation -- Verifying Code...”View full text
Electronic
eBook
2
by Debbabi, Mourad., Debbabi, Mourad., Saleh, Mohamed., Talhi, Chamseddine., Zhioua, Sami.
Published 2007
Table of Contents:
“... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...”Published 2007
View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... Approaches for Minimizing Adaptive Distinguishing Sequences -- Plan It! Automated Security Testing Based...”View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“... Systems -- DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Verification of C Programs -- Test Construction for Mathematical Functions -- Model-Based Testing Service...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“...- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...”View full text
Electronic
eBook
14
Published 2006
Table of Contents:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...”View full text
Electronic
eBook



