Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007, p.115-115
2007



Proceedings of the 10th ACM Conference on security and privacy in wireless and mobile networks, 2017, p.122-133
2017
Link zum Volltext

Proceedings of the 12th ACM symposium on access control models and technologies, 2007, p.205-214
2007
Link zum Volltext


Functional Programming Languages and Computer Architecture: Proceedings of the seventh international conference on Functional programming languages and computer architecture; 26-28 June 1995, 1995, p.12-23
1995
Link zum Volltext

Proceedings of the fourth ACM workshop on formal methods in security, 2006, p.45-54
2006
Link zum Volltext

IEEE journal on selected areas in communications, 2009-04, Vol.27 (3), p.249-252
2009

Annual Symposium on Principles of Programming Languages: Proceedings of the 2005 workshop on Issues in the theory of security; 10-11 Jan. 2005, 2005, p.67-80
2005
Link zum Volltext

IEEE transactions on software engineering, 2002-02, Vol.28 (2), p.129-145
2002

Information and computation, 1989, Vol.81 (2), p.123-167
1989
Link zum Volltext

Journal of functional programming, 1996-03, Vol.6 (2), p.195-244
1996
Link zum Volltext

Proceedings of the 15th ACM conference on computer and communications security, 2008, p.289-298
2008
Link zum Volltext

2007 IEEE Symposium on Security and Privacy (SP '07), 2007, p.33-50
2007

LFP, 92: Conference on LISP and Functional Programming, 1992-01, Vol.V (1), p.139-150
1992
Link zum Volltext

2009 42nd Hawaii International Conference on System Sciences, 2009, p.1-11
2009

2006 IEEE International Conference on Systems, Man and Cybernetics, 2006, Vol.5, p.4268-4275
2006

Proceedings of the fourth ACM workshop on formal methods in security, 2006, p.1-12
2006
Link zum Volltext

2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 2023, p.291-305
2023
Link zum Volltext

International Conference On Embedded Software: Proceedings of the 4th ACM international conference on Embedded software; 27-29 Sept. 2004, 2004, p.211-219
2004
Link zum Volltext

Open Access
Completeness of discovery protocols
Proceedings of the 2nd ACM workshop on assurable and usable security configuration, 2009, p.29-36
2009
Link zum Volltext


Trust and Trustworthy Computing, p.202-216
Link zum Volltext
Aktive Filter
SpracheCroatian
Suchergebnisse filtern
Filter anzeigen
Erscheinungsjahr
n.n
n.n