Your search for 38320 returns 4491 document(s) |
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327 |
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Combining constraint solving and symbolic model checking for a class of sysems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254)Hal. 316-327 |
Author: William Chan; Richard Anderson; Paul Beanne; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Counterarcting phishing page polymorphims: an image layout analysis appraoch, (LNCS-Lecture Notes in Computer Science 5576) Hal. 270-279 |
Author: Ieng-Fat Lam; Wei-Cheng Xino; Szu-Chi Wang; Kuan Ta Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy analysis of multimedia video streaming on mobile devices, (LNCS-Lecture Notes in Computer Science 5576) Hal. 347-357 |
Author: Chu-Hsing LIn; Jung-Chun Liu; Mao-Hua Cheng; Tsung-Che Yang; Mei-Chun Chou; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study of international trend analysis on web service vulnerabilities in OWASP and WASC, (LNCS-Lecture Notes in Computer Science 5576) Hal 788-796 |
Author: Soonseok Kim; Haeyoung Han; Donghwi Shin; Inkyung Jeun; HyunCheol Jeong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential fault analysis on A.E.S, (LNCS-Lecture Notes in Computer Science 2576) Hal 293-306 |
Author: Pierre Dusart; Gilles Letourneux; Olivier Vivolo; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Initial analysis of the proteus architecture, (LNCS-Lecture Notes in Computer Science 2147) Hal 623-627 |
Author: Michael Dales; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of involutional ciphers: khazad and anubis, (LNCS-Lecture Notes in Computer Science 2887) Hal 45-53 |
Author: Alex Biryukov; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169 |
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A generic protection against high-order differential power analysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 192-205 |
Author: Mehdi-Laurent Akkar; Louis Goubin; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|