Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
publicationDateY_i : 2014
Image document

Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus

Carolina Zarate , Simson Garfinkel , Aubin Heffernan , Scott Horras , Kyle Gorak
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.117-132, ⟨10.1007/978-3-662-44952-3_9⟩
Conference papers hal-01393766v1
Image document

A Program Logic for Verifying Secure Routing Protocols

Chen Chen , Limin Jia , Hao Xu , Cheng Luo , Wenchao Zhou , et al.
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.117-132, ⟨10.1007/978-3-662-43613-4_8⟩
Conference papers hal-01398011v1
Image document

An Effective Initialization for ASM-Based Methods

Hong-Quan Hua , T. Ngan Le , Bac Le
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.421-432, ⟨10.1007/978-3-662-45237-0_39⟩
Conference papers hal-01405618v1