1
gan Scarioni, Carlo., Scarioni, Carlo.
Cyhoeddwyd 2013
Pynciau: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
Cael y testun llawn
Electronig eLyfr
2
Cyhoeddwyd 2008
Tabl Cynhwysion: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
Cael y testun llawn
Electronig eLyfr
3
Cyhoeddwyd 2007
Tabl Cynhwysion: ... Foundation for Formal Specifications -- Automated Verification of Security Policies in Mobile Code -- Slicing...
Cael y testun llawn
Electronig eLyfr
4
Cyhoeddwyd 2012
Tabl Cynhwysion: ...ASLan++ — A formal security specification language for distributed Systems -- Orchestration under...
Cael y testun llawn
Electronig eLyfr
5
Cyhoeddwyd 2008
Tabl Cynhwysion: ...Invited Talks -- How Can We Make Industry Adopt Formal Methods? -- Programmers Ain’t Mathematicians...
Cael y testun llawn
Electronig eLyfr
6
Cyhoeddwyd 2010
Tabl Cynhwysion: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
Cael y testun llawn
Electronig eLyfr
7
Cyhoeddwyd 2015
Tabl Cynhwysion: ... Verification of Functional Behaviour of Concurrent Programs -- Investigating Instrumentation Techniques for ESB...
Cael y testun llawn
Electronig eLyfr
8
Cyhoeddwyd 2013
Tabl Cynhwysion: ...Keynote -- Lattices of Information for Security: Deterministic, Demonic, Probabilistic...
Cael y testun llawn
Electronig eLyfr
9
Cyhoeddwyd 2014
Tabl Cynhwysion: ... Systems -- A Language-Independent Proof System for Mutual Program Equivalence -- PHASE: A Stochastic...
Cael y testun llawn
Electronig eLyfr
10
Cyhoeddwyd 2005
Tabl Cynhwysion: ... of Designs -- The Application of an Object-Oriented Method in Information System Security Evaluation...
Cael y testun llawn
Electronig eLyfr
11
Cyhoeddwyd 2008
Tabl Cynhwysion: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
Cael y testun llawn
Electronig eLyfr
12
Cyhoeddwyd 2007
Tabl Cynhwysion: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
Cael y testun llawn
Electronig eLyfr
13
Cyhoeddwyd 2010
Tabl Cynhwysion: ...- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co...
Cael y testun llawn
Electronig eLyfr
14
Cyhoeddwyd 2005
Tabl Cynhwysion: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
Cael y testun llawn
Electronig eLyfr
15
Cyhoeddwyd 2006
Tabl Cynhwysion: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
Cael y testun llawn
Electronig eLyfr
16
Cyhoeddwyd 2008
Tabl Cynhwysion: ... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...
Cael y testun llawn
Electronig eLyfr
17
Cyhoeddwyd 2010
Tabl Cynhwysion: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
Cael y testun llawn
Electronig eLyfr
18
Cyhoeddwyd 2005
Tabl Cynhwysion: ...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...
Cael y testun llawn
Electronig eLyfr
19
gan Harkins, Malcolm., Harkins, Malcolm.
Cyhoeddwyd 2013
Pynciau: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
Cael y testun llawn
Electronig eLyfr
20
Cyhoeddwyd 2010
Tabl Cynhwysion: ... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...
Cael y testun llawn
Electronig eLyfr