Filter your results
- 3
- 3
- 3
- 1
- 3
- 1
- 1
- 2
- 3
- 3
- 5
- 6
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.117-132, ⟨10.1007/978-3-662-44952-3_9⟩
Conference papers
hal-01393766v1
|
||
|
A Program Logic for Verifying Secure Routing Protocols34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.117-132, ⟨10.1007/978-3-662-43613-4_8⟩
Conference papers
hal-01398011v1
|
||
|
An Effective Initialization for ASM-Based Methods13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.421-432, ⟨10.1007/978-3-662-45237-0_39⟩
Conference papers
hal-01405618v1
|