Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functioning general » functioning peer, functioning adenomas, functioning clinical
https functioning » status functioning, its functioning, high functioning
program security » program series, process security, program section
functioning general » functioning peer, functioning adenomas, functioning clinical
https functioning » status functioning, its functioning, high functioning
program security » program series, process security, program section
1
Published 2008
Table of Contents:
“... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...”View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
3
Table of Contents:
“...and Definitions -- Definitions -- General Constructions -- Semi-honest Adversaries -- Malicious...”
View full text
View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...”View full text
Electronic
eBook
5
Published 2013
Table of Contents:
“... -- Robustness Analysis of Finite Precision Implementations -- A Hoare Logic for SIMT Programs -- The Undefined...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“...) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...”View full text
Electronic
eBook
10
Programming Languages and Systems 17th European Symposium on Programming, ESOP 2008, Held as Part...
Published 2008
Table of Contents:
“... Encodings and Dependent Types -- Functional and Logic Programming -- Programming in JoCaml (Tool...”View full text
Electronic
eBook
11
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“... -- Generalized Compact Knapsacks Are Collision Resistant -- An Efficient Provable Distinguisher for HFE -- A...”View full text
Electronic
eBook
13
Programming Languages and Systems 16th European Symposium on Programming, ESOP 2007, Held as Part...
Published 2007
Table of Contents:
“... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...”View full text
Electronic
eBook
14
Programming Languages and Systems 19th European Symposium on Programming, ESOP 2010, Held as Part...
Published 2010
Table of Contents:
“... Computation -- Propositional Interpolation and Abstract Interpretation -- Functional Programming in Sublinear...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“... Minicast Secure Against General Adversaries....”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“.... Semantics -- Game Semantics for Call-by-Value Polymorphism -- What Is a Pure Functional? -- Example-Guided...”View full text
Electronic
eBook
17
Published 2012
Subjects:
“...Logics and Meanings of Programs. https://scigraph.springernature.com/ontologies/product-market...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...”View full text
Electronic
eBook



