Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
structures structures » structures structural
program functionality » protein functionality, programs functional, supra functionality
structures program » structures programs, structured program, structured programs
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
structures structures » structures structural
program functionality » protein functionality, programs functional, supra functionality
structures program » structures programs, structured program, structured programs
securing https » security https, security http, securing rtp
1
Published 2010
Table of Contents:
“... Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues...”View full text
Electronic
eBook
2
Subjects:
“...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...”
View full text
View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”View full text
Electronic
eBook
8
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... Theory of Regular Languages -- Reversible Flowchart Languages and the Structured Reversible Program...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... Tight Bound for EMAC -- Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic...”View full text
Electronic
eBook
11
Programming Languages and Systems 16th European Symposium on Programming, ESOP 2007, Held as Part...
Published 2007
Table of Contents:
“... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...”View full text
Electronic
eBook
13
Published 2014
Table of Contents:
“... & Microcontrollers Security -- An Introduction to the Trusted Platform Module and Mobile Trusted Module -- Hardware...”View full text
Electronic
eBook
14
Subjects:
“...Data Structures and Information Theory. https://scigraph.springernature.com/ontologies/product...”
View full text
View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... Monitoring for Program Security -- Modular Formalization of Reactive Modules in COQ -- Closing Internal...”View full text
Electronic
eBook
16
Table of Contents:
“...Introduction to Cryptography and Data Security -- Stream Ciphers -- The Data Encryption Standard...”
View full text
View full text
Electronic
eBook
17
Published 2012
Table of Contents:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook



