1
Cyhoeddwyd 2015
Tabl Cynhwysion: ... Suites -- Case Study: Automatic test case generation for a secure cache Implementation -- Verifying Code...
Cael y testun llawn
Electronig eLyfr
2
Tabl Cynhwysion: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
Cael y testun llawn
Electronig eLyfr
3
Cyhoeddwyd 2014
Tabl Cynhwysion: ... Approaches for Minimizing Adaptive Distinguishing Sequences -- Plan It! Automated Security Testing Based...
Cael y testun llawn
Electronig eLyfr
4
Cyhoeddwyd 2014
Tabl Cynhwysion: ... Systems -- DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification...
Cael y testun llawn
Electronig eLyfr
5
Cyhoeddwyd 2012
Tabl Cynhwysion: ... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...
Cael y testun llawn
Electronig eLyfr
6
Cyhoeddwyd 2008
Tabl Cynhwysion: ... Verification of C Programs -- Test Construction for Mathematical Functions -- Model-Based Testing Service...
Cael y testun llawn
Electronig eLyfr
7
Cyhoeddwyd 2005
Tabl Cynhwysion: ... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...
Cael y testun llawn
Electronig eLyfr
8
Cyhoeddwyd 2007
Tabl Cynhwysion: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
Cael y testun llawn
Electronig eLyfr
9
Cyhoeddwyd 2008
Tabl Cynhwysion: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
Cael y testun llawn
Electronig eLyfr
10
Cyhoeddwyd 2010
Tabl Cynhwysion: ...- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co...
Cael y testun llawn
Electronig eLyfr
11
Cyhoeddwyd 2006
Tabl Cynhwysion: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
Cael y testun llawn
Electronig eLyfr
12
Cyhoeddwyd 2008
Tabl Cynhwysion: ... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...
Cael y testun llawn
Electronig eLyfr
13
Cyhoeddwyd 2006
Tabl Cynhwysion: ... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...
Cael y testun llawn
Electronig eLyfr
14
Cyhoeddwyd 2012
Tabl Cynhwysion: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
Cael y testun llawn
Electronig eLyfr
15
Cyhoeddwyd 2006
Tabl Cynhwysion: ... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...
Cael y testun llawn
Electronig eLyfr
16
Cyhoeddwyd 2005
Tabl Cynhwysion: ... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...
Cael y testun llawn
Electronig eLyfr
17
Cyhoeddwyd 2005
Tabl Cynhwysion: ...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...
Cael y testun llawn
Electronig eLyfr
18
Cyhoeddwyd 2008
Tabl Cynhwysion: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
Cael y testun llawn
Electronig eLyfr
19
Cyhoeddwyd 2008
Tabl Cynhwysion: ...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...
Cael y testun llawn
Electronig eLyfr
20
Cyhoeddwyd 2010
Tabl Cynhwysion: ...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...
Cael y testun llawn
Electronig eLyfr