Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
programming method » programming methods, programming methodology
method https » methods https
1
by Scarioni, Carlo., Scarioni, Carlo.
Published 2013
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Foundation for Formal Specifications -- Automated Verification of Security Policies in Mobile Code -- Slicing...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ...ASLan++ — A formal security specification language for distributed Systems -- Orchestration under...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ...Invited Talks -- How Can We Make Industry Adopt Formal Methods? -- Programmers Ain’t Mathematicians...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ...Keynote -- Lattices of Information for Security: Deterministic, Demonic, Probabilistic...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ... Verification of Functional Behaviour of Concurrent Programs -- Investigating Instrumentation Techniques for ESB...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ... Systems -- A Language-Independent Proof System for Mutual Program Equivalence -- PHASE: A Stochastic...
View full text
Electronic eBook
10
Published 2005
Table of Contents: ... of Designs -- The Application of an Object-Oriented Method in Information System Security Evaluation...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...
View full text
Electronic eBook
19
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...
View full text
Electronic eBook