Sciweavers

5665 search results - page 26 / 1133
» Introduction to Computer Security
Sort
View
98
Voted
CSFW
1994
IEEE
15 years 6 months ago
A Model of Computation for the NRL Protocol Analyzer
Catherine Meadows
CCS
2010
ACM
15 years 2 months ago
Computationally sound verification of source code
Michael Backes, Matteo Maffei, Dominique Unruh