Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Libro
|
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial LecturesAldini, Alessandro ; Barthe, Gilles ; Gorrieri, Roberto Aldini, Alessandro ; Gorrieri, Roberto ; Barthe, GillesBerlin, Heidelberg: Springer Berlin Heidelberg 2014Sin texto completo |
|
2 |
Material Type: Acta de Congreso
|
ESC/Java2: Uniting ESC/Java and JML: Progress and Issues in Building and Using ESC/Java2, Including a Case Study Involving the Use of the Tool to Verify Portions of an Internet Voting Tally SystemCok, David R. ; Kiniry, Joseph R. Barthe, Gilles ; Huisman, Marieke ; Lanet, Jean-Louis ; Muntean, Traian ; Burdy, LilianConstruction and Analysis of Safe, Secure, and Interoperable Smart Devices, 2005, p.108-128 [Revista revisada por pares]Berlin, Heidelberg: Springer Berlin HeidelbergSin texto completo |
|
3 |
Material Type: Acta de Congreso
|
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approachesBeckers, Kristian ; Faßbender, Stephan ; Heisel, Maritta ; Küster, Jan-Christoph ; Schmidt, Holger Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, p.14-21 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |
|
4 |
Material Type: Acta de Congreso
|
Plagiarizing smartphone applications: attack strategies and defense techniquesPotharaju, Rahul ; Newell, Andrew ; Nita-Rotaru, Cristina ; Zhang, Xiangyu Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, p.106-120 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |
|
5 |
Material Type: Acta de Congreso
|
Formalisation and implementation of the XACML access control mechanismMasi, Massimiliano ; Pugliese, Rosario ; Tiezzi, Francesco Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, p.60-74 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |
|
6 |
Material Type: Acta de Congreso
|
Application-Replay attack on java cards: when the garbage collector gets confusedBarbu, Guillaume ; Hoogvorst, Philippe ; Duc, Guillaume Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, Vol.7159, p.1-13 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |
|
7 |
Material Type: Acta de Congreso
|
Runtime enforcement of information flow security in tree manipulating processesKov$#225;cs, M$#225;té ; Seidl, Helmut Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, p.46-59 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |
|
8 |
Material Type: Acta de Congreso
|
Typed assembler for a RISC crypto-processorBreuer, Peter T. ; Bowen, Jonathan P. Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, p.22-29 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |
|
9 |
Material Type: Acta de Congreso
|
Hunting application-level logical errorsStergiopoulos, George ; Tsoumas, Bill ; Gritzalis, Dimitris Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, p.135-142 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |
|
10 |
Material Type: Acta de Congreso
|
Challenges in implementing an end-to-end secure protocol for java ME-Based mobile data collection in low-budget settingsGejibo, Samson ; Mancini, Federico ; Mughal, Khalid A. ; Valvik, Remi ; Klungsøyr, Jørn Barthe, Gilles ; Scandariato, Riccardo ; Livshits, Benjamin ; Barthe, Gilles ; Scandariato, Riccardo ; Livshits, BenjaminEngineering Secure Software and Systems, 2012, p.38-45 [Revista revisada por pares]Berlin, Heidelberg: Springer-VerlagTexto completo disponible |