<--- Back to Details
First PageDocument Content
Civil law / Digital signature / Programming language theory / Cyberwarfare / Gamper / Intrusion detection system / Pascal
Date: 2008-05-24 13:53:07
Civil law
Digital signature
Programming language theory
Cyberwarfare
Gamper
Intrusion detection system
Pascal

Celeste - Distributed Secure Storage

Add to Reading List

Source URL: www.fp6-noah.org

Download Document from Source Website

File Size: 215,31 KB

Share Document on Facebook

Similar Documents

Programming Language Methods in Computer Security John Mitchell Stanford University

DocID: 1umIb - View Document

Theory and Practice of Logic Programming 1 The Language Features and Architecture of B-Prolog

DocID: 1tFuL - View Document

Dr Nicholas Cameron Curriculum Vitae Higher Education PhD in Computing (Programming Language Theory), Imperial College London, April 2009. - “Existential Types for Variance — Java Wildcards and Ownership Types” (ab

DocID: 1sUyz - View Document

Software engineering / Programming language theory / Computer programming / Haskell / Literate programming / PM

Northeast PARC Regional Working Group Meeting August 13-14, 2002 in Pennsylvania Tuesday, August 13, :00 pm Arrival and Registration

DocID: 1ru6u - View Document

Software engineering / Software / Type theory / Programming language theory / Proof assistants / Functional languages / Formal methods / Logic in computer science / Formal verification / Dependent type / Agda / Coq

bイオウウ・ャウL@SP@o」エッ「・イ@RPQU cost@PUUOQU decision sオ「ェ・」エZ@

DocID: 1rtVS - View Document