IC

Results: 14218



#Item
41Verification Coverage for Combining Test and Proof Viet Hoang Le1 , Lo¨ıc Correnson2 , Julien Signoles2 , and Virginie Wiels3 1  2

Verification Coverage for Combining Test and Proof Viet Hoang Le1 , Lo¨ıc Correnson2 , Julien Signoles2 , and Virginie Wiels3 1 2

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2018-06-20 05:46:32
42Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting Nick Nikiforakis∗ , Alexandros Kapravelos† , Wouter Joosen∗ , Christopher Kruegel† , Frank Piessens∗ , Giovanni Vigna† ∗ iMinds

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting Nick Nikiforakis∗ , Alexandros Kapravelos† , Wouter Joosen∗ , Christopher Kruegel† , Frank Piessens∗ , Giovanni Vigna† ∗ iMinds

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-07 03:28:15
43A Type Discipline for Authorization in Distributed Systems C´edric Fournet Microsoft Research Andrew D. Gordon Microsoft Research

A Type Discipline for Authorization in Distributed Systems C´edric Fournet Microsoft Research Andrew D. Gordon Microsoft Research

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
44Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson  Stanford University

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2012-03-30 06:50:04
45Towards a Program Logic for JavaScript Philippa Gardner Sergio Maffeis  Gareth Smith

Towards a Program Logic for JavaScript Philippa Gardner Sergio Maffeis Gareth Smith

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2011-11-09 05:36:37
    46Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

    Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2010-03-08 04:28:13
    47A Type Discipline for Authorization Policies ´ CEDRIC FOURNET and ANDREW D. GORDON Microsoft Research and

    A Type Discipline for Authorization Policies ´ CEDRIC FOURNET and ANDREW D. GORDON Microsoft Research and

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    48śË¬ ĸèģ¬ƇƑ Ëś¬ËIJ ģ¬ŌÀńèƑ śő ¬ő ĸőèǂŰèƋĸèőËèÚ Żƴ¬ƋƣèƋÀ¬ËłŶ u6# Ğ  uƳ¿ŃķƐıçÙ 5ƊķÙ¬ǂƐ ýŚƊ Ƣıç ŐçķĢı¿ŚƊıŚŚÙƐ Śý }Ƣŵ uçƢçƊƐ¿ƳƊ

    śË¬ ĸèģ¬ƇƑ Ëś¬ËIJ ģ¬ŌÀńèƑ śő ¬ő ĸőèǂŰèƋĸèőËèÚ Żƴ¬ƋƣèƋÀ¬ËłŶ u6# Ğ uƳ¿ŃķƐıçÙ 5ƊķÙ¬ǂƐ ýŚƊ Ƣıç ŐçķĢı¿ŚƊıŚŚÙƐ Śý }Ƣŵ uçƢçƊƐ¿ƳƊ

    Add to Reading List

    Source URL: nieonline.com

    Language: Vietnamese
      49VARAN the Unbelievable An Efficient N-version Execution Framework Petr Hosek Cristian Cadar

      VARAN the Unbelievable An Efficient N-version Execution Framework Petr Hosek Cristian Cadar

      Add to Reading List

      Source URL: srg.doc.ic.ac.uk

      Language: English - Date: 2015-03-16 05:19:54
      50Refinement Types for Secure Implementations JESPER BENGTSON, Uppsala University KARTHIKEYAN BHARGAVAN, Microsoft Research ´ CEDRIC FOURNET, Microsoft Research

      Refinement Types for Secure Implementations JESPER BENGTSON, Uppsala University KARTHIKEYAN BHARGAVAN, Microsoft Research ´ CEDRIC FOURNET, Microsoft Research

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2012-02-28 13:28:34