Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 41 - 60 von 127

41

Attacks on Java Card 3.0 Combining Fault and Logical Attacks.
Barbu, Guillaume ; Thiebeauld, Hugues ; Guerin, Vincent
Smart Card Research & Advanced Application; 2010, p148-163, 16p

Buch
42

Konfigurering av Java Pathfinder för Javaprogram med samtidiga processer
Bwogi, Andrew ; Dagdelen, Tuncay

Computer Sciences Datavetenskap (datalogi)
Dissertation
43

Language-Based Security.
Goos, Gerhard ; Hartmanis, Juris ; van Leeuwen, Jan ; et al.
Mathematical Foundations of Computer Science 1999. 1999, p284-298. 15p.

Buch
44

Result Certification of Static Program Analysers with Automated Theorem Provers
Besson, Frédéric ; Cornilleau, Pierre-Emmanuel ; Jensen, Thomas ; et al.
VSTTE 2013 - Fifth Working Conference on Verified Software: Theories, Tools and Experiments ; https://inria.hal.science/hal-00924167 ; VSTTE 2013 - Fifth Working Conference on Verified Software: Theories, Tools and Experiments, 2013, Atherthon, United States

Atherthon United States [INFO.INFO-PL]Computer S...
Konferenz
45

Dieses Ergebnis kann Gästen nicht angezeigt werden.

46

Dieses Ergebnis kann Gästen nicht angezeigt werden.

47

Abstract
Eva Rose ; Kristoffer Høgsbro Rose ; The Pennsylvania State University CiteSeerX Archives
http://ag-kastens.upb.de/wir/taiko/diss/rose98lightweight.pdf.

Fachzeitschrift
48

Dieses Ergebnis kann Gästen nicht angezeigt werden.

49

Dieses Ergebnis kann Gästen nicht angezeigt werden.

51

Fondements sémantiques des représentations intermédiaires de programmes
Demange, Delphine

Compilation certifiée Sémantique formelle Représentations interméd... Certified compilation Formal semantics Intermediate representat...
Dissertation
52

Language-based security
Dexter Kozen ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.cornell.edu/~kozen/papers/lbs.pdf.

Fachzeitschrift
53

Theorem proving in higher order logics: 16th international conference, TPHOLs 2003, Rome, Italy, September 8-12, 2003 : proceedings
Basin, David. ; Wolff, Burkhart, 1962-

Automatic theorem provin... Computer science. Logic design. Software engineering. Artificial intelligence. Conference proceedings.
Buch
54

Inférence de certificats pour la vérification statique des programmes Java
Menif, Emna

QA 76.05 UL 2012 M545 Java (Langage de program... Sécurité Mesures
Dissertation
55

Language-Based Security
Kozen, Dexter

computer science technical report
Report
56

Verified Bytecode Verification and Type-Certifying Compilation
Gerwin Klein ; Martin Strecker ; The Pennsylvania State University CiteSeerX Archives
http://www4.in.tum.de/publ/papers/esmart02.pdf.

Key words Java JVM Compiler Bytecode Verification Theorem Proving
Fachzeitschrift
58

Simple Verification Technique for Complex Java Bytecode Subroutines
Alessandro Coglio ; The Pennsylvania State University CiteSeerX Archives
ftp://ftp.kestrel.edu/pub/papers/coglio/ftjp02.pdf

Fachzeitschrift
59

Simple Verification Technique for Complex Java Bytecode Subroutines
Alessandro Coglio ; The Pennsylvania State University CiteSeerX Archives
ftp://ftp.kestrel.edu/pub/papers/coglio/subr.pdf

Fachzeitschrift
60

Lightweight verification of control flow policies on Java bytecode
Fontaine, Arnaud ; Hym, Samuel ; Simplot-Ryl, Isabelle ; et al.
https://inria.hal.science/inria-00580923 ; [Research Report] RR-7584, INRIA. 2011, pp.22.

[INFO.INFO-CR]Computer S... [INFO.INFO-MC]Computer S... [INFO.INFO-IU]Computer S... [INFO.INFO-ES]Computer S...
Report

Filter