Pynciau a Argymhellir O fewn eich chwiliad
Pynciau a Argymhellir O fewn eich chwiliad
Chwilio eraill:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programming method » programming methods, programming methodology
securing https » security https, security http, securing rtp
method https » methods https
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programming method » programming methods, programming methodology
securing https » security https, security http, securing rtp
method https » methods https
1
Pynciau:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
Cael y testun llawn
Cael y testun llawn
Electronig
eLyfr
2
Cyhoeddwyd 2008
Tabl Cynhwysion:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”Cael y testun llawn
Electronig
eLyfr
3
Cyhoeddwyd 2007
Tabl Cynhwysion:
“... Foundation for Formal Specifications -- Automated Verification of Security Policies in Mobile Code -- Slicing...”Cael y testun llawn
Electronig
eLyfr
4
Cyhoeddwyd 2012
Tabl Cynhwysion:
“...ASLan++ — A formal security specification language for distributed Systems -- Orchestration under...”Cael y testun llawn
Electronig
eLyfr
5
Cyhoeddwyd 2008
Tabl Cynhwysion:
“...Invited Talks -- How Can We Make Industry Adopt Formal Methods? -- Programmers Ain’t Mathematicians...”Cael y testun llawn
Electronig
eLyfr
6
Cyhoeddwyd 2010
Tabl Cynhwysion:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”Cael y testun llawn
Electronig
eLyfr
7
Cyhoeddwyd 2015
Tabl Cynhwysion:
“... Verification of Functional Behaviour of Concurrent Programs -- Investigating Instrumentation Techniques for ESB...”Cael y testun llawn
Electronig
eLyfr
8
Cyhoeddwyd 2013
Tabl Cynhwysion:
“...Keynote -- Lattices of Information for Security: Deterministic, Demonic, Probabilistic...”Cael y testun llawn
Electronig
eLyfr
9
Cyhoeddwyd 2014
Tabl Cynhwysion:
“... Systems -- A Language-Independent Proof System for Mutual Program Equivalence -- PHASE: A Stochastic...”Cael y testun llawn
Electronig
eLyfr
10
Cyhoeddwyd 2005
Tabl Cynhwysion:
“... of Designs -- The Application of an Object-Oriented Method in Information System Security Evaluation...”Cael y testun llawn
Electronig
eLyfr
11
Cyhoeddwyd 2008
Tabl Cynhwysion:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”Cael y testun llawn
Electronig
eLyfr
12
Cyhoeddwyd 2007
Tabl Cynhwysion:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”Cael y testun llawn
Electronig
eLyfr
13
Cyhoeddwyd 2010
Tabl Cynhwysion:
“...- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co...”Cael y testun llawn
Electronig
eLyfr
14
Cyhoeddwyd 2005
Tabl Cynhwysion:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”Cael y testun llawn
Electronig
eLyfr
15
Cyhoeddwyd 2006
Tabl Cynhwysion:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”Cael y testun llawn
Electronig
eLyfr
16
Cyhoeddwyd 2008
Tabl Cynhwysion:
“... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...”Cael y testun llawn
Electronig
eLyfr
17
Cyhoeddwyd 2010
Tabl Cynhwysion:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”Cael y testun llawn
Electronig
eLyfr
18
Cyhoeddwyd 2005
Tabl Cynhwysion:
“...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...”Cael y testun llawn
Electronig
eLyfr
19
Pynciau:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
Cael y testun llawn
Cael y testun llawn
Electronig
eLyfr
20
Cyhoeddwyd 2010
Tabl Cynhwysion:
“... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...”Cael y testun llawn
Electronig
eLyfr



