Your search for 38938 returns 3685 document(s) |
Using compositional preorders in the verification of sliding window protocol, (LNCS-Lecture Notes in Computer Science 1254) Hal 48-59 |
Author: Roope Kaivola; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards a mechanization of cryptographic protocol verification, (LNCS-Lecture Notes in Computer Science 1254) Hal 131-142 |
Author: Dominique Bolignano; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards an implementation-oriented specification of TP protocol in LOTOS, (LNCS-Lecture Notes in Computer Science 670) Hal 93-109 |
Author: Ing Widya; Gert-Jan van der Heijden; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Constructing hybrid control systems form robust linear control agents,((LNCS-Lecture Notes in Computer Science 999) Hal. 324-343 |
Author: Michael Lemmon; Christopher Beitt; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59 |
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89 |
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Challenges in the verification of electronic control units, (LNCS-Lecture Notes in Computer Science 1926) Hal 18 |
Author: Werner Damm; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threshold and bounded-delay voting in critical control systems, ((LNCS-Lecture Notes in Computer Science 1926) Hal 70-81 |
Author: Paul Caspi; Rym Salem; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|