Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Computer software 3
- Cryptography 3
- Data protection 3
- Information technology 2
- Verification 2
- Algebra, Boolean 1
- Coding theory 1
- Computer logic 1
- Data encryption (Computer science) 1
- Data integrity 1
- Mathematical models 1
- Number theory 1
- Reliability 1
- Security measures 1
- Software engineering 1
- Software protection 1
- System safety 1
- System theory 1
-
1
Algorithms, architectures and information systems security
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
Modelling cyber security approaches, methodology, strategies /
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Software and systems safety specification and verification /
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Software safety and security tools for analysis and verification /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Verification of infinite-state systems with applications to security
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Information assurance and computer security
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
8
A process for developing a common vocabulary in the information security area
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Formal logical methods for system security and correctness
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Boolean functions in cryptology and information security
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
11
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Secure telematic applications for national scale projects
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook