Search alternatives:
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
coding pythons » codigo python (Expand search), coding methods (Expand search)
pythons python » python python (Expand search), pitons python (Expand search), piton python (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
code secure » more secure (Expand search), scale secure (Expand search), cloud secure (Expand search)
coder code » code code (Expand search), modern code (Expand search), color code (Expand search)
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
coding pythons » codigo python (Expand search), coding methods (Expand search)
pythons python » python python (Expand search), pitons python (Expand search), piton python (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
code secure » more secure (Expand search), scale secure (Expand search), cloud secure (Expand search)
coder code » code code (Expand search), modern code (Expand search), color code (Expand search)
1
2
3
4
5
6
“... a mechanism that allows the secure production and verification of web-applications JavaScript code. The paper...”
Access document
Access document
7
8
“... a code analysis and translation engine to generate python code. This engine analyses the application...”
Access document
Access document
9
10
11
12
13
Subjects:
“...[en] MULTI-TASK PROGRAMMING...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
14
15
16
17
“.... Originally designed for execution in web browsers, it has expanded to executing code in restricted and secure...”
Access document
Access document
Article
18
“... context. The platform shall allow students to submit their code and then, in a controlled and secure...”
Access document
Access document
Master thesis
19
20
“... makes automated verification of constant-time code an essential component for building secure software...”
Access document
Access document