Year of publication
Type of media
Source
Type of material
Licence
Language
1–50 of 67 hits
Sort by:
Sort by:
-
Article 5 (57 pages) - Verified Interoperable Implementations of Security Protocols
Online Contents | 2009| -
Thursday, January 15th, 2004 - Session 5 (14:00-15:30) - A Semantics for Web Services Authentication
Online Contents | 2004| -
SOFTWARE ENGINEERING - Formal Verification of Standards for Distance Vector Routing Protocols
Online Contents | 2002| -
miTLS: Verifying Protocol Implementations against Real-World Attacks
British Library Online Contents | 2016| -
Defensive JavaScript: Building and Verifying Secure Web Components
British Library Online Contents | 2014| -
Cryptographic Verification by Typing for a Sample Protocol Implementation
British Library Online Contents | 2011| -
Defensive JavaScript: Building and Verifying Secure Web Components
British Library Conference Proceedings | 2014| -
Service Combinators for Farming Virtual Machines (Abstract)
British Library Conference Proceedings | 2008| -
Service Combinators for Farming Virtual Machines (Abstract)
British Library Online Contents | 2008| -
A Constraint-Based Formalism for Consistency in Replicated Systems
British Library Conference Proceedings | 2005| -
A Constraint-Based Formalism for Consistency in Replicated Systems
British Library Online Contents | 2005| -
Modular Verification of Security Protocol Code by Typing
British Library Conference Proceedings | 2010| -
Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage
British Library Conference Proceedings | 2013| -
Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage
British Library Online Contents | 2013| -
Verified Interoperable Implementations of Security Protocols
British Library Online Contents | 2009| -
Verified Reference Implementations of WS-Security Protocols
British Library Online Contents | 2006| -
An Implementation of TLS 1.2 with Verified Cryptographic Security
British Library Conference Proceedings | 2013| -
An Implementation of TLS 1.2 with Verified Cryptographic Security
British Library Online Contents | 2013| -
Secure Distributed Programming with Value-Dependent Types
British Library Conference Proceedings | 2011| -
Verified Interoperable Implementations of Security Protocols
British Library Conference Proceedings | 2007| -
The Village Telephone System: A Case Study in Formal Software Engineering
British Library Conference Proceedings | 1998|
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.