Search Results

Filter
  • 1-10 of  190 results for "eds"
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Assuring BetterTimes.

  • Source: Journal of Computer Security. 2018, Vol. 26 Issue 4, p557-587. 31p.

Record details

×
Academic Journal

Permissive runtime information flow control in the presence of exceptions.

  • Source: Journal of Computer Security. 2021, Vol. 29 Issue 4, p361-401. 41p.

Record details

×
Academic Journal

Resource and timing aspects of security protocols.

  • Source: Journal of Computer Security. 2021, Vol. 29 Issue 3, p299-340. 42p.

Record details

×
Academic Journal

A permission-dependent type system for secure information flow analysis.

  • Source: Journal of Computer Security. 2021, Vol. 29 Issue 2, p161-228. 68p.

Record details

×
Academic Journal

Publicly auditable conditional blind signatures.

  • Source: Journal of Computer Security. 2021, Vol. 29 Issue 2, p229-271. 43p.

Record details

×
Academic Journal

FWS: Analyzing, maintaining and transcompiling firewalls.

  • Source: Journal of Computer Security. 2021, Vol. 29 Issue 1, p77-134. 58p.

Record details

×
  • 1-10 of  190 results for "eds"