Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
![]() |
Formal verification of information flow security for a simple arm-based separation kernelDam, Mads ; Guanciale, Roberto ; Khakpour, Narges ; Nemati, Hamed ; Schwarz, OliverProceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, p.223-234New York, NY, USA: ACMTexto completo disponível |
2 |
Material Type: Ata de Congresso
|
![]() |
Scalable and efficient provable data possessionAteniese, Giuseppe ; Di Pietro, Roberto ; Mancini, Luigi V. ; Tsudik, GeneProceedings of the 4th international conference on Security and privacy in communication netowrks, 2008, p.1-10New York, NY, USA: ACMTexto completo disponível |
3 |
Material Type: Ata de Congresso
|
![]() |
Efficient integrity checking of untrusted network storageHeitzmann, Alexander ; Palazzi, Bernardo ; Papamanthou, Charalampos ; Tamassia, RobertoProceedings of the 4th ACM international workshop on Storage security and survivability, 2008, p.43-54New York, NY, USA: ACMTexto completo disponível |
4 |
Material Type: Ata de Congresso
|
![]() |
A low-cost sensor platform for large-scale wideband spectrum monitoringCalvo-Palomino, Roberto ; Pfammatter, Damian ; Giustiniano, Domenico ; Lenders, VincentProceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015, p.396-397New York, NY, USA: ACMTexto completo disponível |
5 |
Material Type: Ata de Congresso
|
![]() |
Mechanisms for specifying communication behavior in object oriented database systemsPires, Paulo F. ; Benevides, Mário Roberto F. ; Mattoso, Marta Oppenheim, Dave ; Haddad, Hisham ; Damiani, Ernesto ; Carroll, JaniceProceedings of the 2000 ACM symposium on Applied computing - Volume 1, 2000, p.389-397New York, NY, USA: ACMTexto completo disponível |
6 |
Material Type: Ata de Congresso
|
![]() |
Difficult queuing simulation problems: rare-event simulation for infinite server queuesSzechtman, Roberto ; Glynn, Peter W.Proceedings of the 34th conference on Winter simulation: exploring new frontiers, 2002, p.416-423Winter Simulation ConferenceTexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
Constrained Monte Carlo and the method of control variatesSzechtman, Roberto ; Glynn, Peter W.Proceedings of the 33nd conference on Winter simulation, 2001, p.394-400Washington, DC, USA: IEEE Computer SocietyTexto completo disponível |
8 |
Material Type: Ata de Congresso
|
![]() |
Provable data possession at untrusted storesAteniese, Giuseppe ; Burns, Randal ; Curtmola, Reza ; Herring, Joseph ; Kissner, Lea ; Peterson, Zachary ; Song, DawnConference on Computer and Communications Security: Proceedings of the 14th ACM conference on Computer and communications security; 28-31 Oct. 2007, 2007, p.598-609New York, NY, USA: ACMTexto completo disponível |
9 |
Material Type: Ata de Congresso
|
![]() |
Electro-magnetic analysis of GPU-based AES implementationGao, Yiwen ; Zhang, Hailong ; Cheng, Wei ; Zhou, Yongbin ; Cao, YuchenProceedings of the 55th Annual Design Automation Conference, 2018, p.1-6New York, NY, USA: ACMTexto completo disponível |
10 |
Material Type: Ata de Congresso
|
![]() |
On the automorphism groups of strongly regular graphs IBabai, LászlóProceedings of the 5th conference on Innovations in theoretical computer science, 2014, p.359-368New York, NY, USA: ACMTexto completo disponível |