Önerilen Konular
Önerilen Konular
Şunu mu demek istediniz:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs complex » programs compiler, programs complete, programs complexity
securing https » security https, security http, securing rtp
complex https » complexity https, complex atoms, complex atp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programs complex » programs compiler, programs complete, programs complexity
securing https » security https, security http, securing rtp
complex https » complexity https, complex atoms, complex atp
1
Baskı/Yayın Bilgisi 2008
İçindekiler:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”Tam Metin Erişim
Elektronik
Ekitap
2
Baskı/Yayın Bilgisi 2007
İçindekiler:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”Tam Metin Erişim
Elektronik
Ekitap
3
Baskı/Yayın Bilgisi 2010
İçindekiler:
“... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...”Tam Metin Erişim
Elektronik
Ekitap
4
Baskı/Yayın Bilgisi 2005
İçindekiler:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”Tam Metin Erişim
Elektronik
Ekitap
5
Baskı/Yayın Bilgisi 2005
İçindekiler:
“... Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences...”Tam Metin Erişim
Elektronik
Ekitap
6
Baskı/Yayın Bilgisi 2006
İçindekiler:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”Tam Metin Erişim
Elektronik
Ekitap
7
Baskı/Yayın Bilgisi 2012
İçindekiler:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”Tam Metin Erişim
Elektronik
Ekitap
8
Baskı/Yayın Bilgisi 2010
İçindekiler:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”Tam Metin Erişim
Elektronik
Ekitap
9
Baskı/Yayın Bilgisi 2012
İçindekiler:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”Tam Metin Erişim
Elektronik
Ekitap
10
Baskı/Yayın Bilgisi 2006
İçindekiler:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”Tam Metin Erişim
Elektronik
Ekitap
11
Baskı/Yayın Bilgisi 2012
İçindekiler:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”Tam Metin Erişim
Elektronik
Ekitap
12
Baskı/Yayın Bilgisi 2008
İçindekiler:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”Tam Metin Erişim
Elektronik
Ekitap
13
Baskı/Yayın Bilgisi 2007
İçindekiler:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”Tam Metin Erişim
Elektronik
Ekitap
14
Baskı/Yayın Bilgisi 2005
İçindekiler:
“...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...”Tam Metin Erişim
Elektronik
Ekitap
15
Baskı/Yayın Bilgisi 2015
İçindekiler:
“... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...”Tam Metin Erişim
Elektronik
Ekitap
16
Baskı/Yayın Bilgisi 2010
İçindekiler:
“.... Semantics -- Game Semantics for Call-by-Value Polymorphism -- What Is a Pure Functional? -- Example-Guided...”Tam Metin Erişim
Elektronik
Ekitap
17
Baskı/Yayın Bilgisi 2010
İçindekiler:
“...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...”Tam Metin Erişim
Elektronik
Ekitap
18
Baskı/Yayın Bilgisi 2014
İçindekiler:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”Tam Metin Erişim
Elektronik
Ekitap
19
Baskı/Yayın Bilgisi 2010
İçindekiler:
“... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...”Tam Metin Erişim
Elektronik
Ekitap
20
Baskı/Yayın Bilgisi 2008
İçindekiler:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”Tam Metin Erişim
Elektronik
Ekitap



