1
by Scarioni, Carlo., Scarioni, Carlo.
Published 2013
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
2
Table of Contents: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
7
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook
8
Published 2011
Subjects: ...Programming Languages, Compilers, Interpreters. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
10
Published 2005
Table of Contents: ... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...
View full text
Electronic eBook
11
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
14
Subjects: ...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
View full text
Electronic eBook
20
by Ruan, Xiaoyu., Ruan, Xiaoyu.
Published 2014
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook