Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
programmed interactive » programmer's interactive, programming interactive, program interactive
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
interactive https » interaction https, interactions https, interactive hip
securing https » security https, security http, securing rtp
programmed interactive » programmer's interactive, programming interactive, program interactive
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
interactive https » interaction https, interactions https, interactive hip
securing https » security https, security http, securing rtp
1
Pubblicazione 2015
Sommario:
“...-Order Functional Intermediate Language for Verified Compilers -- Autosubst: Reasoning with de Bruijn...”Testo
Elettronico
eBook
2
Pubblicazione 2012
Sommario:
“... Tactics Using OpenTheory -- Functional Programs: Conversions between Deep and Shallow Embeddings....”Testo
Elettronico
eBook
3
Pubblicazione 2014
Sommario:
“... Programs Extraction -- Experience Implementing a Performant Category-Theory Library in Coq -- A New...”Testo
Elettronico
eBook
4
Pubblicazione 2006
Sommario:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”Testo
Elettronico
eBook
5
Pubblicazione 2010
Sommario:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”Testo
Elettronico
eBook
6
Pubblicazione 2008
Sommario:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”Testo
Elettronico
eBook
7
Pubblicazione 2007
Sommario:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”Testo
Elettronico
eBook
8
Pubblicazione 2005
Sommario:
“... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...”Testo
Elettronico
eBook
9
Pubblicazione 2012
Sommario:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”Testo
Elettronico
eBook
10
Pubblicazione 2008
Sommario:
“... Declarative Theorem Prover for First-Order Classical Logic -- Towards Ludics Programming: Interactive Proof...”Testo
Elettronico
eBook
11
Pubblicazione 2006
Sommario:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”Testo
Elettronico
eBook
12
Pubblicazione 2005
Sommario:
“... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...”Testo
Elettronico
eBook
13
Pubblicazione 2005
Sommario:
“...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...”Testo
Elettronico
eBook
14
Pubblicazione 2010
Sommario:
“... Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues...”Testo
Elettronico
eBook
15
Pubblicazione 2008
Sommario:
“...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...”Testo
Elettronico
eBook
16
Pubblicazione 2005
Sommario:
“...-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based...”Testo
Elettronico
eBook
17
Pubblicazione 2015
Sommario:
“... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...”Testo
Elettronico
eBook
18
Pubblicazione 2014
Sommario:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”Testo
Elettronico
eBook
19
Pubblicazione 2007
Sommario:
“... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...”Testo
Elettronico
eBook
20
Pubblicazione 2010
Sommario:
“... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...”Testo
Elettronico
eBook



