Suggested Topics within your search.
Suggested Topics within your search.
- History of engineering & technology 3
- Computer Graphics 2
- Computer games 2
- Computer graphics 2
- Computer networking & communications 2
- Computer security 2
- Education 2
- Education and state 2
- Educational Policy and Politics 2
- Electronic digital computers 2
- Evaluation 2
- Film, TV & radio 2
- Game Development 2
- Games development & programming 2
- Graphical & digital media applications 2
- Graphics programming 2
- Image processing 2
- Information technology: general issues 2
- Information theory 2
- Literary theory 2
- Popular culture 2
- Production & quality control management 2
- Programming 2
- System Performance and Evaluation 2
- Application software 1
- Art 1
- Coding and Information Theory 1
- Coding theory 1
- Comparative education 1
- Computer Communication Networks 1
-
301
-
302
Building with Nature & Beyond Principles for designing nature based engineering solutions
Published 2021Access online version
Electronic eBook -
303
-
304
-
305
-
306
-
307
-
308
-
309
-
310
-
311
-
312
-
313
Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessalonik...
Published 2018Table of Contents: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
Link to Metadata
Electronic eBook -
314
-
315
-
316
-
317
-
318
-
319
-
320