Search alternatives:
security programming » secure programming (Expand search), security program (Expand search), security programs (Expand search)
using security » testing security (Expand search), things security (Expand search), housing insecurity (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder using » coders using (Expand search), cover using (Expand search), code using (Expand search)
security programming » secure programming (Expand search), security program (Expand search), security programs (Expand search)
using security » testing security (Expand search), things security (Expand search), housing insecurity (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder using » coders using (Expand search), cover using (Expand search), code using (Expand search)
1
2
3
4
5
6
7
8
9
10
Subjects:
“...[pt] PROOF-CARRYING CODE...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
11
12
“... of experiments using three different testbeds was performed to analyze different security techniques regarding...”
Access document
Access document
Doctoral thesis
13
“... is a spread of security vulnerabilities related to their use. Best practices advise the use of systematic code...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
14
15
16
17
18
19
20
“...With the increasing usage of the Internet, the development of Web Application Programming Interface...”
Access document
Access document
Master thesis