1
Published 2010
Table of Contents: ... Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues...
View full text
Electronic eBook
2
Subjects: ...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
8
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ... Theory of Regular Languages -- Reversible Flowchart Languages and the Structured Reversible Program...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... Tight Bound for EMAC -- Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... & Microcontrollers Security -- An Introduction to the Trusted Platform Module and Mobile Trusted Module -- Hardware...
View full text
Electronic eBook
14
by West, Adrian W., West, Adrian W.
Published 2013
Subjects: ...Data Structures and Information Theory. https://scigraph.springernature.com/ontologies/product...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... Monitoring for Program Security -- Modular Formalization of Reactive Modules in COQ -- Closing Internal...
View full text
Electronic eBook
16
Table of Contents: ...Introduction to Cryptography and Data Security -- Stream Ciphers -- The Data Encryption Standard...
View full text
Electronic eBook
17
Published 2012
Table of Contents: ... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook