1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
9
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...
View full text
Electronic eBook
11
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...
View full text
Electronic eBook
16
Published 2010
Table of Contents: .... Semantics -- Game Semantics for Call-by-Value Polymorphism -- What Is a Pure Functional? -- Example-Guided...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook