Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
programs practice » programs practices, program practice, programs practical
practice https » practice has, practice hot, pragmatics https
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
programs practice » programs practices, program practice, programs practical
practice https » practice has, practice hot, pragmatics https
1
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
2
Programming Languages and Systems 19th European Symposium on Programming, ESOP 2010, Held as Part...
Published 2010
Table of Contents:
“... Computation -- Propositional Interpolation and Abstract Interpretation -- Functional Programming in Sublinear...”View full text
Electronic
eBook
3
Programming Languages and Systems 17th European Symposium on Programming, ESOP 2008, Held as Part...
Published 2008
Table of Contents:
“... Semantics for Hybrid Systems -- Full Abstraction for Linda -- Practical Programming with Higher-Order...”View full text
Electronic
eBook
4
Programming Languages and Systems 16th European Symposium on Programming, ESOP 2007, Held as Part...
Published 2007
Table of Contents:
“... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...”View full text
Electronic
eBook
5
Programming Languages and Systems 23rd European Symposium on Programming, ESOP 2014, Held as Part...
Published 2014
Table of Contents:
“... Verification for Higher-Order Functional Programs -- An Abstract Domain to Infer Ordinal-Valued Ranking...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“...Ontology-Driven Data Semantics Discovery for Cyber-Security -- State Space Planning Using...”View full text
Electronic
eBook
9
Subjects:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
View full text
View full text
Electronic
eBook
10
Table of Contents:
“... Web Applications with mongrel -- Transferring Files Securely with net-sftp -- Executing Commands...”
View full text
View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
14
Published 2006
Table of Contents:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...”View full text
Electronic
eBook
18
Subjects:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
View full text
View full text
Electronic
eBook
19
Published 2015
Table of Contents:
“... and Effectiveness of U.S. Nuclear and Radiological Material Security Programs -- Neutralizing Radicalized Threat...”View full text
Electronic
eBook
20
Table of Contents:
“... -- The Dynamic Host Configuration Protocol (DHCPv6) -- Bridging the DNS Gap -- New Functionalities -- IP Security...”
View full text
View full text
Electronic
eBook



