Search alternatives:
secure program » security program (Expand search), leisure program (Expand search), care program (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
and secure » and seizure (Expand search), and cure (Expand search), and security (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
secure program » security program (Expand search), leisure program (Expand search), care program (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
and secure » and seizure (Expand search), and cure (Expand search), and security (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
1
2
“... to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel...”
Access document
Access document
Article
3
“... and, once resident in the program memory, they trigger a pre-existing software flaw and transfer...”
Access document
Access document
Master thesis
4
5
6
7
9
10
“...- services/visiting-and-exploring-the-uae/social-responsibility/dress-code- 29 Nasir S. Face jail...”
Access document
Access document
Article
11
“...[pt] Programação segura é a prática de se escrever programas que são resistentes a ataques...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
12
“... problems in a structured manner. This master’s program is focused on the engineering and implementation...”
Access document
Access document
Master thesis
13
“... programming is hard on its own, and extremely hard under additional efficiency and legacy constraints. This...”
Access document
Access document
14
“... context. The platform shall allow students to submit their code and then, in a controlled and secure...”
Access document
Access document
Master thesis
15
16
“...Este trabalho foi desenvolvido no Programa de PÃs-GraduaÃÃo da Faculdade de Educa...”
Access document
Access document
Master thesis
17
18
20
“... by the processor. To this end, the public FISSC (Fault Injection and Simulation Secure Collection) code...”
Access document
Access document
Bachelor thesis