Search Result Save to File Save as CSV
Your search for 38886 returns 2455 document(s)
Using design-level scan to improve FPGA design observability and controllability for functional verification, (LNCS-Lecture Notes in Computer Science 2147) Hal 483-492
Author: Timothy Wheeler; Paul Graham; Brent Nelson; Brad Hutchings; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Scaling up uppaal automatic verification of real-time systems using compositionality and abstraction, (LNCS-Lecture Notes in Computer Science 1926) Hal 19-30
Author: Henrik Ejersbo Jensen; Kim Guldstrand Larsen; Arne Skou; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal verification of digital systems, from ASICs to HW/SW codesign - a pragmatic approach, (LNCS-Lecture Notes in Computer Science 3709) Hal 3-6
Author: Roger B. Hughes; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using formal verification/analysis methods on the critical path in system design: a case study, (LNCS-Lecture Notes in Computer Science 939) Hal 367-380
Author: Asgeir Th. Eiriksson; Ken L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protocol interactions and the chosen protocol attack, LNCS-Lecture Notes in Computer Science 1361) Hal 91-104
Author: John Kelsey; Bruce Schneier; David Wagner; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure books: protecting the distribution of knowledge, (LNCS-Lecture Notes in Computer Science 1361) Hal 1-11
Author: Ross J Anderson; Vaclav Matyas Jr; Fabien A Petitcolas; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protocols using anonymous connections: mobile applications, (LNCS-Lecture Notes in Computer Science 1361) Hal 13-23
Author: Michael G. Reed; Paul F. Syverson; David M. Goldschlag; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Flexible internet secure transactions based on collaborative domains, (LNCS-Lecture Notes in Computer Science 1361) Hal 37-51
Author: Eduardo Solana; Jurgen Harms; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How to build evidence in a public-key infrastructure for multi-domain environments, (LNCS-Lecture Notes in Computer Science 1361) Hal 53-65
Author: Bruno Crispo; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next