Author: Sergio Maffeis
Publisher:
ISBN: 9781450314411
Category : Computer networks
Languages : en
Pages : 91
Book Description
Proceedings of the 7th Workshop on Programming Languages and Analysis for Security
Author: Sergio Maffeis
Publisher:
ISBN: 9781450314411
Category : Computer networks
Languages : en
Pages : 91
Book Description
Publisher:
ISBN: 9781450314411
Category : Computer networks
Languages : en
Pages : 91
Book Description
Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security
Author: Alejandro Russo
Publisher:
ISBN: 9781450328623
Category : Computer networks
Languages : en
Pages : 83
Book Description
Publisher:
ISBN: 9781450328623
Category : Computer networks
Languages : en
Pages : 83
Book Description
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security
Author: Nataliia Bielova
Publisher:
ISBN: 9781450350990
Category :
Languages : en
Pages : 122
Book Description
Publisher:
ISBN: 9781450350990
Category :
Languages : en
Pages : 122
Book Description
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security
Author: Michael Hicks
Publisher:
ISBN: 9781595937117
Category : Computer science
Languages : en
Pages : 116
Book Description
Publisher:
ISBN: 9781595937117
Category : Computer science
Languages : en
Pages : 116
Book Description
Proceedings of the 15th Workshop on Programming Languages and Analysis for Security
Author: Alley Stoughton
Publisher:
ISBN: 9781450380928
Category :
Languages : en
Pages : 46
Book Description
Publisher:
ISBN: 9781450380928
Category :
Languages : en
Pages : 46
Book Description
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security
Author: Vugranam Sreedhar
Publisher:
ISBN: 9781595933744
Category : Computer science
Languages : en
Pages : 0
Book Description
Publisher:
ISBN: 9781595933744
Category : Computer science
Languages : en
Pages : 0
Book Description
Information Theoretic Security
Author: Kaoru Kurosawa
Publisher: Springer Science & Business Media
ISBN: 3642144950
Category : Business & Economics
Languages : en
Pages : 258
Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Theoretic Security, held in Shizuoka, Japan, in December 2009. The 13 revised full papers presented together with 6 invited lectures were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on leakage resilient cryptography, quantum cryptography and indistinguishability, connection to computational security, secret sharing, key agreement from common randomness, random graph and group testing, reliable data transmission and computation, as well as fingerprint and watermarking.
Publisher: Springer Science & Business Media
ISBN: 3642144950
Category : Business & Economics
Languages : en
Pages : 258
Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Theoretic Security, held in Shizuoka, Japan, in December 2009. The 13 revised full papers presented together with 6 invited lectures were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on leakage resilient cryptography, quantum cryptography and indistinguishability, connection to computational security, secret sharing, key agreement from common randomness, random graph and group testing, reliable data transmission and computation, as well as fingerprint and watermarking.
Runtime Verification
Author: Axel Legay
Publisher: Springer
ISBN: 3642407870
Category : Computers
Languages : en
Pages : 439
Book Description
This book constitutes the refereed proceedings of the 4th International Conference on Runtime Verification, RV 2013, held in Rennes, France, in September 2013. The 24 revised full papers presented together with 3 invited papers, 2 tool papers, and 6 tutorials were carefully reviewed and selected from 58 submissions. The papers address a wide range of specification languages and formalisms for traces; specification mining; program instrumentation; monitor construction techniques; logging, recording, and replay; fault detection, localization, recovery, and repair; program steering and adaptation; as well as metrics and statistical information gathering; combination of static and dynamic analyses and program execution visualization.
Publisher: Springer
ISBN: 3642407870
Category : Computers
Languages : en
Pages : 439
Book Description
This book constitutes the refereed proceedings of the 4th International Conference on Runtime Verification, RV 2013, held in Rennes, France, in September 2013. The 24 revised full papers presented together with 3 invited papers, 2 tool papers, and 6 tutorials were carefully reviewed and selected from 58 submissions. The papers address a wide range of specification languages and formalisms for traces; specification mining; program instrumentation; monitor construction techniques; logging, recording, and replay; fault detection, localization, recovery, and repair; program steering and adaptation; as well as metrics and statistical information gathering; combination of static and dynamic analyses and program execution visualization.
PLAS'18
Author:
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages :
Book Description
PLAS '17
Author:
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 122
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 122
Book Description