Sciweavers

6861 search results - page 71 / 1373
» Security for Ubiquitous Computing
Sort
View
114
Voted
CSFW
1994
IEEE
15 years 8 months ago
A Model of Computation for the NRL Protocol Analyzer
Catherine Meadows
CCS
2010
ACM
15 years 4 months ago
Computationally sound verification of source code
Michael Backes, Matteo Maffei, Dominique Unruh